rhba-2022_3893
Vulnerability from csaf_redhat
Published
2022-05-17 13:12
Modified
2024-11-22 17:34
Summary
Red Hat Bug Fix Advisory: new packages: redhat-release
Notes
Topic
New redhat-release packages are available for Red Hat Enterprise Linux 9.
Details
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.0 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New redhat-release packages are available for Red Hat Enterprise Linux 9.", "title": "Topic" }, { "category": "general", "text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.0 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2022:3893", "url": "https://access.redhat.com/errata/RHBA-2022:3893" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index" }, { "category": "external", "summary": "1997061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997061" }, { "category": "external", "summary": "2001783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001783" }, { "category": "external", "summary": "2002496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002496" }, { "category": "external", "summary": "2005552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005552" }, { "category": "external", "summary": "2011240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011240" }, { "category": "external", "summary": "2013299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013299" }, { "category": "external", "summary": "2022717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022717" }, { "category": "external", "summary": "2024610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024610" }, { "category": "external", "summary": "2031998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031998" }, { "category": "external", "summary": "2049627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049627" }, { "category": "external", "summary": "2057686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057686" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhba-2022_3893.json" } ], "title": "Red Hat Bug Fix Advisory: new packages: redhat-release", "tracking": { "current_release_date": "2024-11-22T17:34:57+00:00", "generator": { "date": "2024-11-22T17:34:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2022:3893", "initial_release_date": "2022-05-17T13:12:16+00:00", "revision_history": [ { "date": "2022-05-17T13:12:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-17T13:12:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T17:34:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "redhat-sb-certs-0:9.0-2.17.el9.noarch", "product": { "name": "redhat-sb-certs-0:9.0-2.17.el9.noarch", "product_id": "redhat-sb-certs-0:9.0-2.17.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-sb-certs@9.0-2.17.el9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "redhat-release-0:9.0-2.17.el9.src", "product": { "name": "redhat-release-0:9.0-2.17.el9.src", "product_id": "redhat-release-0:9.0-2.17.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-release-0:9.0-2.17.el9.aarch64", "product": { "name": "redhat-release-0:9.0-2.17.el9.aarch64", "product_id": "redhat-release-0:9.0-2.17.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=aarch64" } } }, { "category": "product_version", "name": "redhat-release-eula-0:9.0-2.17.el9.aarch64", "product": { "name": "redhat-release-eula-0:9.0-2.17.el9.aarch64", "product_id": "redhat-release-eula-0:9.0-2.17.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "redhat-release-0:9.0-2.17.el9.ppc64le", "product": { "name": "redhat-release-0:9.0-2.17.el9.ppc64le", "product_id": "redhat-release-0:9.0-2.17.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le", "product": { "name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le", "product_id": "redhat-release-eula-0:9.0-2.17.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "redhat-release-0:9.0-2.17.el9.x86_64", "product": { "name": "redhat-release-0:9.0-2.17.el9.x86_64", "product_id": "redhat-release-0:9.0-2.17.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-eula-0:9.0-2.17.el9.x86_64", "product": { "name": "redhat-release-eula-0:9.0-2.17.el9.x86_64", "product_id": "redhat-release-eula-0:9.0-2.17.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-release-0:9.0-2.17.el9.s390x", "product": { "name": "redhat-release-0:9.0-2.17.el9.s390x", "product_id": "redhat-release-0:9.0-2.17.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release@9.0-2.17.el9?arch=s390x" } } }, { "category": "product_version", "name": "redhat-release-eula-0:9.0-2.17.el9.s390x", "product": { "name": "redhat-release-eula-0:9.0-2.17.el9.s390x", "product_id": "redhat-release-eula-0:9.0-2.17.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-eula@9.0-2.17.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64" }, "product_reference": "redhat-release-0:9.0-2.17.el9.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le" }, "product_reference": "redhat-release-0:9.0-2.17.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x" }, "product_reference": "redhat-release-0:9.0-2.17.el9.s390x", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src" }, "product_reference": "redhat-release-0:9.0-2.17.el9.src", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64" }, "product_reference": "redhat-release-0:9.0-2.17.el9.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.s390x", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-sb-certs-0:9.0-2.17.el9.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch" }, "product_reference": "redhat-sb-certs-0:9.0-2.17.el9.noarch", "relates_to_product_reference": "BaseOS-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64" }, "product_reference": "redhat-release-0:9.0-2.17.el9.aarch64", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le" }, "product_reference": "redhat-release-0:9.0-2.17.el9.ppc64le", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x" }, "product_reference": "redhat-release-0:9.0-2.17.el9.s390x", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src" }, "product_reference": "redhat-release-0:9.0-2.17.el9.src", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-0:9.0-2.17.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64" }, "product_reference": "redhat-release-0:9.0-2.17.el9.x86_64", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.aarch64", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.ppc64le", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.s390x", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-eula-0:9.0-2.17.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64" }, "product_reference": "redhat-release-eula-0:9.0-2.17.el9.x86_64", "relates_to_product_reference": "CRB-9.0.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-sb-certs-0:9.0-2.17.el9.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch" }, "product_reference": "redhat-sb-certs-0:9.0-2.17.el9.noarch", "relates_to_product_reference": "CRB-9.0.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267525" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff \u003c0f\u003e 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64", "BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64", "CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47076" }, { "category": "external", "summary": "RHBZ#2267525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u" } ], "release_date": "2024-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-17T13:12:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64", "BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64", "CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2022:3893" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src", "BaseOS-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x", "BaseOS-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64", "BaseOS-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.aarch64", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.ppc64le", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.s390x", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.src", "CRB-9.0.0.GA:redhat-release-0:9.0-2.17.el9.x86_64", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.aarch64", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.ppc64le", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.s390x", "CRB-9.0.0.GA:redhat-release-eula-0:9.0-2.17.el9.x86_64", "CRB-9.0.0.GA:redhat-sb-certs-0:9.0-2.17.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.