Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-3022 (GCVE-0-2023-3022)
Vulnerability from cvelistv5
Published
2023-06-19 00:00
Modified
2025-03-11 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
References
| URL | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Linux Kernel (IPv6) |
Version: Fixed in kernel 5.2-rc1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:41:04.211Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-3022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-06T15:55:19.466585Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T14:48:04.464Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Linux Kernel (IPv6)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in kernel 5.2-rc1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "CWE-843",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-19T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2023-3022",
"datePublished": "2023-06-19T00:00:00.000Z",
"dateReserved": "2023-05-31T00:00:00.000Z",
"dateUpdated": "2025-03-11T14:48:04.464Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-3022\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-06-19T18:15:09.870\",\"lastModified\":\"2025-03-11T15:15:38.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1\",\"matchCriteriaId\":\"A1E6CFAF-D31D-4E5F-BB85-AC66A715BFF4\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2211440\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/a65120bae4b7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2211440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/a65120bae4b7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-06-19T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.\"}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Linux Kernel (IPv6)\", \"versions\": [{\"version\": \"Fixed in kernel 5.2-rc1\", \"status\": \"affected\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2211440\"}, {\"url\": \"https://github.com/torvalds/linux/commit/a65120bae4b7\"}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-843\", \"cweId\": \"CWE-843\"}]}]}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:41:04.211Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2211440\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/a65120bae4b7\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-3022\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-06T15:55:19.466585Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-06T15:55:20.697Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2023-3022\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"assignerShortName\": \"redhat\", \"dateUpdated\": \"2025-03-11T14:48:04.464Z\", \"dateReserved\": \"2023-05-31T00:00:00.000Z\", \"datePublished\": \"2023-06-19T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ghsa-f6mp-2jrx-cmh3
Vulnerability from github
Published
2023-06-19 18:30
Modified
2024-04-04 04:58
Severity ?
VLAI Severity ?
Details
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
{
"affected": [],
"aliases": [
"CVE-2023-3022"
],
"database_specific": {
"cwe_ids": [
"CWE-843"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-06-19T18:15:09Z",
"severity": "MODERATE"
},
"details": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"id": "GHSA-f6mp-2jrx-cmh3",
"modified": "2024-04-04T04:58:00Z",
"published": "2023-06-19T18:30:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
RHSA-2023:1130
Vulnerability from csaf_redhat
Published
2023-03-07 14:00
Modified
2025-10-09 22:42
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)
* fix for "CoW after fork() issue" aka "vmsplice child -> parent attack" aka "GUP after fork bug" (BZ#2137546)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)
* RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)
* RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)
* RHEL8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142171)
* RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)
* RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)
* error 524 from seccomp(2) when trying to load filter (BZ#2152139)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153231)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)
* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)
* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)
* 'date' command shows wrong time in nested KVM s390x guest (BZ#2158814)
* Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160461)
* Mellanox: backport "net/mlx5e: TC NIC mode, fix tc chains miss table" (BZ#2161630)
* Kernel panic observed during VxFS module unload (BZ#2162764)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)
* In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)
* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)\n\n* fix for \"CoW after fork() issue\" aka \"vmsplice child -\u003e parent attack\" aka \"GUP after fork bug\" (BZ#2137546)\n\n* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)\n\n* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)\n\n* RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)\n\n* RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)\n\n* RHEL8: Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142171)\n\n* RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)\n\n* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)\n\n* RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)\n\n* error 524 from seccomp(2) when trying to load filter (BZ#2152139)\n\n* The \"kernel BUG at mm/usercopy.c:103!\" from BZ 2041529 is back on rhel-8.5 (BZ#2153231)\n\n* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)\n\n* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)\n\n* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)\n\n* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)\n\n* \u0027date\u0027 command shows wrong time in nested KVM s390x guest (BZ#2158814)\n\n* Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)\n\n* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)\n\n* i40e/iavf: VF reset task fails \"Never saw reset\" with 5 second timeout per VF (BZ#2160461)\n\n* Mellanox: backport \"net/mlx5e: TC NIC mode, fix tc chains miss table\" (BZ#2161630)\n\n* Kernel panic observed during VxFS module unload (BZ#2162764)\n\n* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)\n\n* In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)\n\n* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)\n\n* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)\n\n* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)\n\n* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1130",
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2150272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1130.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:30+00:00",
"generator": {
"date": "2025-10-09T22:42:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:1130",
"initial_release_date": "2023-03-07T14:00:38+00:00",
"revision_history": [
{
"date": "2023-03-07T14:00:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-07T14:00:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.46.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.46.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2022-11-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: CPU soft lockup in TC mirred egress-to-ingress action",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 is not affected by this flaw as it did not include upstream commit 53592b3 (\"net/sched: act_mirred: Implement ingress actions\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4269"
},
{
"category": "external",
"summary": "RHBZ#2150272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269"
}
],
"release_date": "2022-09-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: CPU soft lockup in TC mirred egress-to-ingress action"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
RHSA-2022:1975
Vulnerability from csaf_redhat
Published
2022-05-10 13:43
Modified
2025-10-10 02:13
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1975",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1903578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"
},
{
"category": "external",
"summary": "1905749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:13:17+00:00",
"generator": {
"date": "2025-10-10T02:13:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1975",
"initial_release_date": "2022-05-10T13:43:14+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:13:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s RDMA/irdma driver. Improper memory management in the add_pble_prm function fails to manage memory correctly, resulting in a user-after-free condition that can lead to exploitation. This flaw allows an attacker to manipulate memory access potentially, resulting in data corruption or system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
rhsa-2023:1130
Vulnerability from csaf_redhat
Published
2023-03-07 14:00
Modified
2025-10-09 22:42
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)
* fix for "CoW after fork() issue" aka "vmsplice child -> parent attack" aka "GUP after fork bug" (BZ#2137546)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)
* RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)
* RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)
* RHEL8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142171)
* RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)
* RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)
* error 524 from seccomp(2) when trying to load filter (BZ#2152139)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153231)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)
* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)
* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)
* 'date' command shows wrong time in nested KVM s390x guest (BZ#2158814)
* Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160461)
* Mellanox: backport "net/mlx5e: TC NIC mode, fix tc chains miss table" (BZ#2161630)
* Kernel panic observed during VxFS module unload (BZ#2162764)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)
* In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)
* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)\n\n* fix for \"CoW after fork() issue\" aka \"vmsplice child -\u003e parent attack\" aka \"GUP after fork bug\" (BZ#2137546)\n\n* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)\n\n* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)\n\n* RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)\n\n* RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)\n\n* RHEL8: Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142171)\n\n* RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)\n\n* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)\n\n* RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)\n\n* error 524 from seccomp(2) when trying to load filter (BZ#2152139)\n\n* The \"kernel BUG at mm/usercopy.c:103!\" from BZ 2041529 is back on rhel-8.5 (BZ#2153231)\n\n* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)\n\n* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)\n\n* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)\n\n* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)\n\n* \u0027date\u0027 command shows wrong time in nested KVM s390x guest (BZ#2158814)\n\n* Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)\n\n* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)\n\n* i40e/iavf: VF reset task fails \"Never saw reset\" with 5 second timeout per VF (BZ#2160461)\n\n* Mellanox: backport \"net/mlx5e: TC NIC mode, fix tc chains miss table\" (BZ#2161630)\n\n* Kernel panic observed during VxFS module unload (BZ#2162764)\n\n* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)\n\n* In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)\n\n* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)\n\n* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)\n\n* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)\n\n* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1130",
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2150272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1130.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:42:30+00:00",
"generator": {
"date": "2025-10-09T22:42:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2023:1130",
"initial_release_date": "2023-03-07T14:00:38+00:00",
"revision_history": [
{
"date": "2023-03-07T14:00:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-07T14:00:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:42:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.46.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.46.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2022-11-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: CPU soft lockup in TC mirred egress-to-ingress action",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 is not affected by this flaw as it did not include upstream commit 53592b3 (\"net/sched: act_mirred: Implement ingress actions\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4269"
},
{
"category": "external",
"summary": "RHBZ#2150272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269"
}
],
"release_date": "2022-09-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: CPU soft lockup in TC mirred egress-to-ingress action"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
rhsa-2022:1975
Vulnerability from csaf_redhat
Published
2022-05-10 13:43
Modified
2025-10-10 02:13
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1975",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1903578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"
},
{
"category": "external",
"summary": "1905749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:13:17+00:00",
"generator": {
"date": "2025-10-10T02:13:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1975",
"initial_release_date": "2022-05-10T13:43:14+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:13:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s RDMA/irdma driver. Improper memory management in the add_pble_prm function fails to manage memory correctly, resulting in a user-after-free condition that can lead to exploitation. This flaw allows an attacker to manipulate memory access potentially, resulting in data corruption or system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
rhsa-2023_1130
Vulnerability from csaf_redhat
Published
2023-03-07 14:00
Modified
2024-11-15 17:13
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)
* fix for "CoW after fork() issue" aka "vmsplice child -> parent attack" aka "GUP after fork bug" (BZ#2137546)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)
* RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)
* RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)
* RHEL8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142171)
* RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)
* RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)
* error 524 from seccomp(2) when trying to load filter (BZ#2152139)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153231)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)
* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)
* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)
* 'date' command shows wrong time in nested KVM s390x guest (BZ#2158814)
* Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160461)
* Mellanox: backport "net/mlx5e: TC NIC mode, fix tc chains miss table" (BZ#2161630)
* Kernel panic observed during VxFS module unload (BZ#2162764)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)
* In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)
* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)\n\n* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)\n\n* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)\n\n* fix for \"CoW after fork() issue\" aka \"vmsplice child -\u003e parent attack\" aka \"GUP after fork bug\" (BZ#2137546)\n\n* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)\n\n* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)\n\n* RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)\n\n* RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)\n\n* RHEL8: Practically limit \"Dummy wait\" workaround to old Intel systems (BZ#2142171)\n\n* RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)\n\n* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)\n\n* RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)\n\n* error 524 from seccomp(2) when trying to load filter (BZ#2152139)\n\n* The \"kernel BUG at mm/usercopy.c:103!\" from BZ 2041529 is back on rhel-8.5 (BZ#2153231)\n\n* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)\n\n* MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)\n\n* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)\n\n* RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)\n\n* \u0027date\u0027 command shows wrong time in nested KVM s390x guest (BZ#2158814)\n\n* Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)\n\n* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)\n\n* i40e/iavf: VF reset task fails \"Never saw reset\" with 5 second timeout per VF (BZ#2160461)\n\n* Mellanox: backport \"net/mlx5e: TC NIC mode, fix tc chains miss table\" (BZ#2161630)\n\n* Kernel panic observed during VxFS module unload (BZ#2162764)\n\n* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)\n\n* In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)\n\n* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)\n\n* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)\n\n* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)\n\n* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1130",
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "2150272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1130.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T17:13:41+00:00",
"generator": {
"date": "2024-11-15T17:13:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:1130",
"initial_release_date": "2023-03-07T14:00:38+00:00",
"revision_history": [
{
"date": "2023-03-07T14:00:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-07T14:00:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T17:13:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.46.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.46.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.46.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.46.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.46.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.46.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2067482"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory corruption in AX88179_178A based USB ethernet device.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2964"
},
{
"category": "external",
"summary": "RHBZ#2067482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: memory corruption in AX88179_178A based USB ethernet device."
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2022-11-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: CPU soft lockup in TC mirred egress-to-ingress action",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6 is not affected by this flaw as it did not include upstream commit 53592b3 (\"net/sched: act_mirred: Implement ingress actions\").",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4269"
},
{
"category": "external",
"summary": "RHBZ#2150272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269"
}
],
"release_date": "2022-09-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: CPU soft lockup in TC mirred egress-to-ingress action"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138818"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/mremap.c use-after-free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41222"
},
{
"category": "external",
"summary": "RHBZ#2138818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138818"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2"
}
],
"release_date": "2021-07-07T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm/mremap.c use-after-free vulnerability"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-07T14:00:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1130"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.46.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.46.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.46.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
rhsa-2022_1975
Vulnerability from csaf_redhat
Published
2022-05-10 13:43
Modified
2024-11-15 17:12
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1975",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1903578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"
},
{
"category": "external",
"summary": "1905749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T17:12:25+00:00",
"generator": {
"date": "2024-11-15T17:12:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1975",
"initial_release_date": "2022-05-10T13:43:14+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T17:12:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a user-after-free in add_pble_prm\n\nWhen irdma_hmc_sd_one fails, \u0027chunk\u0027 is freed while its still on the PBLE\ninfo list.\n\nAdd the chunk entry to the PBLE info list only after successful setting of\nthe SD in irdma_hmc_sd_one.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
WID-SEC-W-2023-1343
Vulnerability from csaf_certbund
Published
2023-05-31 22:00
Modified
2023-05-31 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1343 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1343.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1343 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1343"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2023-05-31",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2023-05-31T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:51:41.147+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1343",
"initial_release_date": "2023-05-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-05-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T006656",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-3022",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Linux Kernel. Bei der Verwendung einer bestimmten lokalen Netzwerkregel kann beim Empfang eines entsprechenden Netzwerkpaketes an der lokalen IPV6-Adresse ein Kernel Absturz herbeigef\u00fchrt werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"T006656"
]
},
"release_date": "2023-05-31T22:00:00.000+00:00",
"title": "CVE-2023-3022"
}
]
}
wid-sec-w-2023-1343
Vulnerability from csaf_certbund
Published
2023-05-31 22:00
Modified
2023-05-31 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1343 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1343.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1343 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1343"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2023-05-31",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2023-05-31T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:51:41.147+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1343",
"initial_release_date": "2023-05-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-05-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T006656",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-3022",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Linux Kernel. Bei der Verwendung einer bestimmten lokalen Netzwerkregel kann beim Empfang eines entsprechenden Netzwerkpaketes an der lokalen IPV6-Adresse ein Kernel Absturz herbeigef\u00fchrt werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"T006656"
]
},
"release_date": "2023-05-31T22:00:00.000+00:00",
"title": "CVE-2023-3022"
}
]
}
cnvd-2023-56646
Vulnerability from cnvd
Title
Linux kernel代码问题漏洞(CNVD-2023-56646)
Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux Kernel存在代码问题漏洞,该漏洞源于IPv6模块中存在缺陷,arg.result在fib6_rule_lookup中的使用不一致,有时持有rt6_info,有时持有fib6_info,攻击者可利用该漏洞导致fib6_rule_suppress中的内核崩溃。
Severity
中
VLAI Severity ?
Patch Name
Linux kernel代码问题漏洞(CNVD-2023-56646)的补丁
Patch Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux Kernel存在代码问题漏洞,该漏洞源于IPv6模块中存在缺陷,arg.result在fib6_rule_lookup中的使用不一致,有时持有rt6_info,有时持有fib6_info,攻击者可利用该漏洞导致fib6_rule_suppress中的内核崩溃。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/torvalds/linux/commit/a65120bae4b7
Reference
https://nvd.nist.gov/vuln/detail/CVE-2023-3022
Impacted products
| Name | Linux Linux kernel <=5.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2023-3022",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux Kernel\u5b58\u5728\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eIPv6\u6a21\u5757\u4e2d\u5b58\u5728\u7f3a\u9677\uff0carg.result\u5728fib6_rule_lookup\u4e2d\u7684\u4f7f\u7528\u4e0d\u4e00\u81f4\uff0c\u6709\u65f6\u6301\u6709rt6_info\uff0c\u6709\u65f6\u6301\u6709fib6_info\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4fib6_rule_suppress\u4e2d\u7684\u5185\u6838\u5d29\u6e83\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/torvalds/linux/commit/a65120bae4b7",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2023-56646",
"openTime": "2023-07-19",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u5b58\u5728\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eIPv6\u6a21\u5757\u4e2d\u5b58\u5728\u7f3a\u9677\uff0carg.result\u5728fib6_rule_lookup\u4e2d\u7684\u4f7f\u7528\u4e0d\u4e00\u81f4\uff0c\u6709\u65f6\u6301\u6709rt6_info\uff0c\u6709\u65f6\u6301\u6709fib6_info\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4fib6_rule_suppress\u4e2d\u7684\u5185\u6838\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2023-56646\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel \u003c=5.1"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"serverity": "\u4e2d",
"submitTime": "2023-06-21",
"title": "Linux kernel\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2023-56646\uff09"
}
fkie_cve-2023-3022
Vulnerability from fkie_nvd
Published
2023-06-19 18:15
Modified
2025-03-11 15:15
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2211440 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://github.com/torvalds/linux/commit/a65120bae4b7 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2211440 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/a65120bae4b7 | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E6CFAF-D31D-4E5F-BB85-AC66A715BFF4",
"versionEndIncluding": "5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress."
}
],
"id": "CVE-2023-3022",
"lastModified": "2025-03-11T15:15:38.650",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-06-19T18:15:09.870",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2023-3022
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-3022",
"id": "GSD-2023-3022"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-3022"
],
"details": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"id": "GSD-2023-3022",
"modified": "2023-12-13T01:20:55.212344Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-3022",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux Kernel (IPv6)",
"version": {
"version_data": [
{
"version_value": "Fixed in kernel 5.2-rc1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"name": "https://github.com/torvalds/linux/commit/a65120bae4b7",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-3022"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/a65120bae4b7",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://github.com/torvalds/linux/commit/a65120bae4b7"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-06-29T17:32Z",
"publishedDate": "2023-06-19T18:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…