rhsa-2022_7933
Vulnerability from csaf_redhat
Published
2022-11-15 11:38
Modified
2024-11-22 18:42
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update

Notes

Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280) * kernel info leak issue in pfkey_register (CVE-2022-1353) * use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) * AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825) * Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nf_tables disallow binding to already bound chain (CVE-2022-39190) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* off-path attacker may inject data or terminate victim\u0027s TCP session (CVE-2020-36516)\n\n* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)\n\n* smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)\n\n* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)\n\n* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)\n\n* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)\n\n* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)\n\n* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)\n\n* concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280)\n\n* kernel info leak issue in pfkey_register (CVE-2022-1353)\n\n* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)\n\n* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)\n\n* fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998)\n\n* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)\n\n* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)\n\n* slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)\n\n* incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)\n\n* incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)\n\n* incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)\n\n* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)\n\n* AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)\n\n* AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)\n\n* use after free in SUNRPC subsystem (CVE-2022-28893)\n\n* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)\n\n* Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)\n\n* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)\n\n* nf_tables disallow binding to already bound chain (CVE-2022-39190)\n\n* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:7933",
        "url": "https://access.redhat.com/errata/RHSA-2022:7933"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/solutions/6971358",
        "url": "https://access.redhat.com/solutions/6971358"
      },
      {
        "category": "external",
        "summary": "1980646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
      },
      {
        "category": "external",
        "summary": "2037386",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037386"
      },
      {
        "category": "external",
        "summary": "2051444",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051444"
      },
      {
        "category": "external",
        "summary": "2052312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052312"
      },
      {
        "category": "external",
        "summary": "2053632",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053632"
      },
      {
        "category": "external",
        "summary": "2058395",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058395"
      },
      {
        "category": "external",
        "summary": "2059928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059928"
      },
      {
        "category": "external",
        "summary": "2066614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614"
      },
      {
        "category": "external",
        "summary": "2066706",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066706"
      },
      {
        "category": "external",
        "summary": "2066819",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066819"
      },
      {
        "category": "external",
        "summary": "2070205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070205"
      },
      {
        "category": "external",
        "summary": "2071022",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071022"
      },
      {
        "category": "external",
        "summary": "2073064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073064"
      },
      {
        "category": "external",
        "summary": "2074208",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074208"
      },
      {
        "category": "external",
        "summary": "2084125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
      },
      {
        "category": "external",
        "summary": "2084183",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084183"
      },
      {
        "category": "external",
        "summary": "2084479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
      },
      {
        "category": "external",
        "summary": "2088021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088021"
      },
      {
        "category": "external",
        "summary": "2089815",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089815"
      },
      {
        "category": "external",
        "summary": "2090226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
      },
      {
        "category": "external",
        "summary": "2090237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
      },
      {
        "category": "external",
        "summary": "2090240",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
      },
      {
        "category": "external",
        "summary": "2090241",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
      },
      {
        "category": "external",
        "summary": "2103148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
      },
      {
        "category": "external",
        "summary": "2103153",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
      },
      {
        "category": "external",
        "summary": "2114878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114878"
      },
      {
        "category": "external",
        "summary": "2115065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
      },
      {
        "category": "external",
        "summary": "2115278",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115278"
      },
      {
        "category": "external",
        "summary": "2123695",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123695"
      },
      {
        "category": "external",
        "summary": "2129152",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129152"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7933.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T18:42:50+00:00",
      "generator": {
        "date": "2024-11-22T18:42:50+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:7933",
      "initial_release_date": "2022-11-15T11:38:03+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T11:38:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T11:38:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T18:42:50+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
                  "product_id": "NFV-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 9)",
                  "product_id": "RT-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
                "product": {
                  "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
                  "product_id": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.6.1.rt21.168.el9_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-162.6.1.rt21.168.el9_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src"
        },
        "product_reference": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
          "product_id": "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "NFV-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src"
        },
        "product_reference": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
          "product_id": "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
        "relates_to_product_reference": "RT-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-36516",
      "cwe": {
        "id": "CWE-290",
        "name": "Authentication Bypass by Spoofing"
      },
      "discovery_date": "2022-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2059928"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A TCP/IP packet spoofing attack flaw was found in the Linux kernel\u2019s TCP/IP protocol, where a Man-in-the-Middle Attack (MITM) performs an IP fragmentation attack and an IPID collision. This flaw allows a remote user to pretend to be the sender of the TCP/IP packet for an existing TCP/IP session.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: off-path attacker may inject data or terminate victim\u0027s TCP session",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "RHBZ#2059928",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059928"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36516",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36516",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "https://www.spinics.net/lists/netdev/msg795642.html",
          "url": "https://www.spinics.net/lists/netdev/msg795642.html"
        }
      ],
      "release_date": "2022-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: off-path attacker may inject data or terminate victim\u0027s TCP session"
    },
    {
      "cve": "CVE-2021-3640",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980646"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free vulnerability in function sco_sock_sendmsg()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980646",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3640",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16\u0026id=99c23da0eed4fd20cae8243f2b51e10e66aa0951",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16\u0026id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2021/8/28/238",
          "url": "https://lkml.org/lkml/2021/8/28/238"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/22/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/22/1"
        }
      ],
      "release_date": "2021-07-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free vulnerability in function sco_sock_sendmsg()"
    },
    {
      "cve": "CVE-2021-47099",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2024-03-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2267919"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nveth: ensure skb entering GRO are not cloned.\n\nAfter commit d3256efd8e8b (\"veth: allow enabling NAPI even without XDP\"),\nif GRO is enabled on a veth device and TSO is disabled on the peer\ndevice, TCP skbs will go through the NAPI callback. If there is no XDP\nprogram attached, the veth code does not perform any share check, and\nshared/cloned skbs could enter the GRO engine.\n\nIgnat reported a BUG triggered later-on due to the above condition:\n\n[   53.970529][    C1] kernel BUG at net/core/skbuff.c:3574!\n[   53.981755][    C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\n[   53.982634][    C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25\n[   53.982634][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n[   53.982634][    C1] RIP: 0010:skb_shift+0x13ef/0x23b0\n[   53.982634][    C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0\n7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f\n85 74 f5 ff ff \u003c0f\u003e 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89\nf7 4c 89 8c\n[   53.982634][    C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246\n[   53.982634][    C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000\n[   53.982634][    C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2\n[   53.982634][    C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0\n[   53.982634][    C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590\n[   53.982634][    C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0\n[   53.982634][    C1] FS:  0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000\n[   53.982634][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   53.982634][    C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0\n[   53.982634][    C1] Call Trace:\n[   53.982634][    C1]  \u003cTASK\u003e\n[   53.982634][    C1]  tcp_sacktag_walk+0xaba/0x18e0\n[   53.982634][    C1]  tcp_sacktag_write_queue+0xe7b/0x3460\n[   53.982634][    C1]  tcp_ack+0x2666/0x54b0\n[   53.982634][    C1]  tcp_rcv_established+0x4d9/0x20f0\n[   53.982634][    C1]  tcp_v4_do_rcv+0x551/0x810\n[   53.982634][    C1]  tcp_v4_rcv+0x22ed/0x2ed0\n[   53.982634][    C1]  ip_protocol_deliver_rcu+0x96/0xaf0\n[   53.982634][    C1]  ip_local_deliver_finish+0x1e0/0x2f0\n[   53.982634][    C1]  ip_sublist_rcv_finish+0x211/0x440\n[   53.982634][    C1]  ip_list_rcv_finish.constprop.0+0x424/0x660\n[   53.982634][    C1]  ip_list_rcv+0x2c8/0x410\n[   53.982634][    C1]  __netif_receive_skb_list_core+0x65c/0x910\n[   53.982634][    C1]  netif_receive_skb_list_internal+0x5f9/0xcb0\n[   53.982634][    C1]  napi_complete_done+0x188/0x6e0\n[   53.982634][    C1]  gro_cell_poll+0x10c/0x1d0\n[   53.982634][    C1]  __napi_poll+0xa1/0x530\n[   53.982634][    C1]  net_rx_action+0x567/0x1270\n[   53.982634][    C1]  __do_softirq+0x28a/0x9ba\n[   53.982634][    C1]  run_ksoftirqd+0x32/0x60\n[   53.982634][    C1]  smpboot_thread_fn+0x559/0x8c0\n[   53.982634][    C1]  kthread+0x3b9/0x490\n[   53.982634][    C1]  ret_from_fork+0x22/0x30\n[   53.982634][    C1]  \u003c/TASK\u003e\n\nAddress the issue by skipping the GRO stage for shared or cloned skbs.\nTo reduce the chance of OoO, try to unclone the skbs before giving up.\n\nv1 -\u003e v2:\n - use avoid skb_copy and fallback to netif_receive_skb  - Eric",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: veth: ensure skb entering GRO are not cloned.",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47099"
        },
        {
          "category": "external",
          "summary": "RHBZ#2267919",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267919"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47099",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47099"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47099",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47099"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T"
        }
      ],
      "release_date": "2024-03-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: veth: ensure skb entering GRO are not cloned."
    },
    {
      "cve": "CVE-2021-47556",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-05-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2283393"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n  cause the crash as it first attempts to call ethtool_get_coalesce()\n  and bails out on error.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47556"
        },
        {
          "category": "external",
          "summary": "RHBZ#2283393",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
        }
      ],
      "release_date": "2024-05-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
    },
    {
      "cve": "CVE-2021-47580",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2024-06-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2293249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47580"
        },
        {
          "category": "external",
          "summary": "RHBZ#2293249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47580",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47580"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47580",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47580"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/T"
        }
      ],
      "release_date": "2024-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Billy Jheng Bing Jhong"
          ],
          "organization": "STAR Labs"
        }
      ],
      "cve": "CVE-2022-0168",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-01-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2037386"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service (DOS) issue was found in the Linux kernel\u2019s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: smb2_ioctl_query_info NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0168"
        },
        {
          "category": "external",
          "summary": "RHBZ#2037386",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037386"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0168",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168"
        }
      ],
      "release_date": "2022-03-09T15:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: smb2_ioctl_query_info NULL pointer dereference"
    },
    {
      "cve": "CVE-2022-0617",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2053632"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference was found in the Linux kernel\u2019s UDF file system functionality in the way the user triggers the udf_file_write_iter function for a malicious UDF image. This flaw allows a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0617"
        },
        {
          "category": "external",
          "summary": "RHBZ#2053632",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053632"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/",
          "url": "https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/"
        }
      ],
      "release_date": "2022-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "As the UDF module (udf.ho) will be auto-loaded when required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install udf /bin/true\" \u003e\u003e /etc/modprobe.d/disable-udf.conf\n\nIf the system requires this module t\\work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Halil Pasic"
          ]
        }
      ],
      "cve": "CVE-2022-0854",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-02-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2058395"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: swiotlb information leak with DMA_FROM_DEVICE",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "RHBZ#2058395",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058395"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0854",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8\u0026id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8\u0026id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"
        }
      ],
      "release_date": "2022-03-07T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: swiotlb information leak with DMA_FROM_DEVICE"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "David Bouman"
          ]
        }
      ],
      "cve": "CVE-2022-1016",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2022-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2066614"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "RHBZ#2066614",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1016",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/",
          "url": "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q1/205",
          "url": "https://seclists.org/oss-sec/2022/q1/205"
        }
      ],
      "release_date": "2022-03-28T15:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "On non-containerized deployments of Red Hat Enterprise Linux, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Takashi Iwai"
          ]
        }
      ],
      "cve": "CVE-2022-1048",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2066706"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in snd_pcm_hw_free leading to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping the rating as Moderate, because this issue is hard to trigger and requires some permissions for accessing the sound card and only exists if a specific model of the sound card such as Intel 82801 or similar. The known reproducer works only for systems where the /dev/snd/pcmC0D1c device exists.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "RHBZ#2066706",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066706"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1048",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3",
          "url": "https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3"
        }
      ],
      "release_date": "2022-03-23T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module snd-pcm from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in snd_pcm_hw_free leading to use-after-free"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        },
        {
          "names": [
            "Gaoning Pan",
            "Yongkang Jia"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-1158",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2069793"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "RHBZ#2069793",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069793"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1158",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/04/08/4",
          "url": "https://www.openwall.com/lists/oss-security/2022/04/08/4"
        }
      ],
      "release_date": "2022-04-07T15:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wenqing Liu"
          ]
        }
      ],
      "cve": "CVE-2022-1184",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-01-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2070205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "RHBZ#2070205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1184",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184"
        }
      ],
      "release_date": "2022-04-18T05:39:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        },
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        }
      ],
      "cve": "CVE-2022-1263",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2072698"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 did not provide support for KVM dirty ring and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "RHBZ#2072698",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072698"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1263",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/04/07/1",
          "url": "https://www.openwall.com/lists/oss-security/2022/04/07/1"
        }
      ],
      "release_date": "2022-04-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Yuan Ming"
          ],
          "organization": "Tsinghua University"
        }
      ],
      "cve": "CVE-2022-1280",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-04-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2071022"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1280"
        },
        {
          "category": "external",
          "summary": "RHBZ#2071022",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071022"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1280",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1280"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1280",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1280"
        }
      ],
      "release_date": "2022-04-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "elijahbai"
          ],
          "organization": "Tencent Security Yunding Lab"
        }
      ],
      "cve": "CVE-2022-1353",
      "cwe": {
        "id": "CWE-212",
        "name": "Improper Removal of Sensitive Information Before Storage or Transfer"
      },
      "discovery_date": "2022-03-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2066819"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel info leak issue in pfkey_register",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1353"
        },
        {
          "category": "external",
          "summary": "RHBZ#2066819",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066819"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1353",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c",
          "url": "https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: kernel info leak issue in pfkey_register"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "elijahbai"
          ],
          "organization": "Tencent Security Yunding Lab"
        }
      ],
      "cve": "CVE-2022-1679",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2084125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping this issue Moderate, because the impact is limited: likely only possibility of memory leak and crash, but not privileges escalation and both kind of race condition that is hard to trigger.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "RHBZ#2084125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/",
          "url": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/"
        }
      ],
      "release_date": "2022-02-07T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module ath9k from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "(Harbin Institute of Technology)"
        },
        {
          "names": [
            "Gaoning Pan",
            "Yongkang Jia"
          ],
          "organization": "(Zhejiang University)"
        }
      ],
      "cve": "CVE-2022-1852",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-05-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2089815"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "RHBZ#2089815",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089815"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1852",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9",
          "url": "https://github.com/torvalds/linux/commit/fee060cd52d69c114b62d1a2948ea9648b5131f9"
        }
      ],
      "release_date": "2022-06-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected KVM module from loading during the boot time, and ensuring the module is added to the blacklist file.\n~~~\nRefer:  \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS"
    },
    {
      "cve": "CVE-2022-1998",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2052312"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s File System notify functionality in the way a user triggers the copy_info_records_to_user() function call to fail in copy_event_to_user(). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fanotify misuses fd_install() which could lead to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1998"
        },
        {
          "category": "external",
          "summary": "RHBZ#2052312",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052312"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1998",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1998"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17\u0026id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17\u0026id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q1/99",
          "url": "https://seclists.org/oss-sec/2022/q1/99"
        }
      ],
      "release_date": "2022-01-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: fanotify misuses fd_install() which could lead to use-after-free"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-2153",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2069736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "RHBZ#2069736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2153",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/06/22/1",
          "url": "https://www.openwall.com/lists/oss-security/2022/06/22/1"
        }
      ],
      "release_date": "2022-03-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()"
    },
    {
      "cve": "CVE-2022-2503",
      "cwe": {
        "id": "CWE-288",
        "name": "Authentication Bypass Using an Alternate Path or Channel"
      },
      "discovery_date": "2022-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2177862"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module and firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification until reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: LoadPin bypass via dm-verity table reload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Starting from the Red Hat Enterprise Linux version 8.7 the bug already fixed (by previous ticket https://bugzilla.redhat.com/show_bug.cgi?id=2012340).\nSimilar for the Red Hat Enterprise Linux version 9.1 it is already fixed (by the ticket https://bugzilla.redhat.com/show_bug.cgi?id=2090507).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "RHBZ#2177862",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177862"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2503",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m"
        }
      ],
      "release_date": "2022-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: LoadPin bypass via dm-verity table reload"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Team Orca"
          ],
          "organization": "Sea Security"
        }
      ],
      "cve": "CVE-2022-2586",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-08-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2114878"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "RHBZ#2114878",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114878"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2586",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2586",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t",
          "url": "https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/08/09/5",
          "url": "https://www.openwall.com/lists/oss-security/2022/08/09/5"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-08-09T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2024-06-26T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation"
    },
    {
      "cve": "CVE-2022-2639",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "discovery_date": "2022-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2084479"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The `openvswitch` is not supported out of the Layered Products subscriptions (OCP, OSP, RHV). There are no Layered Products based on Red Hat Enterprise Linux 7 at the present time. Therefore, this CVE is not planned to be addressed on Red Hat Enterprise Linux 7.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "RHBZ#2084479",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084479"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2639",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639"
        }
      ],
      "release_date": "2022-04-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blocklisting the openvswitch kernel module. For instructions relating to blocklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jiasheng Jiang"
          ]
        }
      ],
      "cve": "CVE-2022-3107",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-12-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2153060"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3107"
        },
        {
          "category": "external",
          "summary": "RHBZ#2153060",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153060"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3107",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3107"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107"
        }
      ],
      "release_date": "2022-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jiasheng Jiang"
          ]
        }
      ],
      "cve": "CVE-2022-3108",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-12-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2153052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3108"
        },
        {
          "category": "external",
          "summary": "RHBZ#2153052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
        }
      ],
      "release_date": "2022-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Dongliang Mu"
          ]
        }
      ],
      "cve": "CVE-2022-3239",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2127985"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s video4linux driver in how a user triggers the em28xx_usb_probe() for the Empia 28xx-based TV cards. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: media: em28xx: initialize refcount before kref_get",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "RHBZ#2127985",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127985"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3239",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module em28xx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: media: em28xx: initialize refcount before kref_get"
    },
    {
      "cve": "CVE-2022-20368",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2123695"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access issue was found in the Linux kernel networking subsystem in the way raw packet sockets (AF_PACKET) used PACKET_COPY_THRESH and mmap operations. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow resulting in a system crash or privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only local users with `CAP_NET_RAW` capability enabled can trigger this issue. On Red Hat Enterprise Linux 8 `CAP_NET_RAW` capability can be gained by exploiting unprivileged user namespaces.\n\nIn a default or common use of Red Hat Enterprise Linux 7 unprivileged user namespaces are disabled by default, so local unprivileged users cannot abuse namespaces to grant themselves the `CAP_NET_RAW` capability and potentially elevate their privileges on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "RHBZ#2123695",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123695"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20368",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20368",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20368"
        }
      ],
      "release_date": "2022-03-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "The mitigation is to disable CAP_NET_RAW capability for regular users and executables to prevent access to raw packet sockets (AF_PACKET). On Red Hat Enterprise Linux 8, the mitigation is to either disable unprivileged user namespaces with `sysctl -w user.max_user_namespaces=0` or network namespaces with `sysctl -w user.max_net_namespaces=0`. For more information on how to set sysctl variables on Red Hat Enterprise Linux, please refer to https://access.redhat.com/solutions/2587.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()"
    },
    {
      "cve": "CVE-2022-20572",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2186545"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where it is possible to modify read-only files due to a missing permission check. This flaw can lead to local privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20572"
        },
        {
          "category": "external",
          "summary": "RHBZ#2186545",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186545"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20572",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20572",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20572"
        }
      ],
      "release_date": "2022-12-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2022-21123",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "discovery_date": "2022-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090237"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21123"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090237",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21123",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
          "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
        }
      ],
      "release_date": "2022-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2022-21125",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "discovery_date": "2022-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090240"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21125"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090240",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21125",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
          "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
        }
      ],
      "release_date": "2022-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Intel"
          ]
        }
      ],
      "cve": "CVE-2022-21166",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "discovery_date": "2022-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090241"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel\u00ae Processors may allow an authenticated user to enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as RHSA. For more information please contact the binary content vendor.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21166"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090241",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21166",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html",
          "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
        }
      ],
      "release_date": "2022-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)"
    },
    {
      "cve": "CVE-2022-21499",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-05-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2084183"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the kernel/debug/debug_core.c in the Linux kernel in lockdown mode. This flaw allows an attacker with local access to trigger the debugger, bypass lockdown and write anonymously.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to use the debugger to write zero into a location of choice",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "RHBZ#2084183",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084183"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21499",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21499",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066"
        }
      ],
      "release_date": "2022-05-24T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to use the debugger to write zero into a location of choice"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Johannes Wikner",
            "Kaveh Razavi"
          ],
          "organization": "ETH Z\u00fcrich"
        }
      ],
      "cve": "CVE-2022-23816",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090226"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-23816"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090226",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23816",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-23816"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
        }
      ],
      "release_date": "2022-07-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "AMD"
          ]
        }
      ],
      "cve": "CVE-2022-23825",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2103153"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type, potentially leading to information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-23825"
        },
        {
          "category": "external",
          "summary": "RHBZ#2103153",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23825",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
        }
      ],
      "release_date": "2022-07-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: AMD: Branch Type Confusion (non-retbleed)"
    },
    {
      "cve": "CVE-2022-24448",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2022-02-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2051444"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. When an application tries to open a directory (using the O_DIRECTORY flag) in a mounted NFS filesystem, a lookup operation is performed. If the NFS server returns a file as a result of the lookup, the NFS filesystem returns an uninitialized file descriptor instead of the expected ENOTDIR value. This flaw leads to the kernel\u0027s data leak into the userspace.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-24448"
        },
        {
          "category": "external",
          "summary": "RHBZ#2051444",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051444"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24448",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf"
        }
      ],
      "release_date": "2022-02-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR"
    },
    {
      "cve": "CVE-2022-26373",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2115065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. In certain processors with Intel\u0027s Enhanced Indirect Branch Restricted Speculation (eIBRS) capabilities, soon after VM exit or IBPB command event, the linear address following the most recent near CALL instruction prior to a VM exit may be used as the Return Stack Buffer (RSB) prediction.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "RHBZ#2115065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115065"
        },
        {
          "category": "external",
          "summary": "RHSB-6971358",
          "url": "https://access.redhat.com/solutions/6971358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26373",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html",
          "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html"
        }
      ],
      "release_date": "2022-08-09T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions"
    },
    {
      "cve": "CVE-2022-28390",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2073064"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free flaw was found in the Linux kernel in the ems_usb_start_xmit function. This flaw allows an attacker to create a memory leak and corrupt the underlying data structure by calling free more than once.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28390"
        },
        {
          "category": "external",
          "summary": "RHBZ#2073064",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073064"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28390",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390"
        }
      ],
      "release_date": "2022-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Johannes Wikner",
            "Kaveh Razavi"
          ],
          "organization": "ETH Zurich"
        }
      ],
      "cve": "CVE-2022-28693",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-07-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2107465"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. The unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: Intel: information disclosure via local access",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28693"
        },
        {
          "category": "external",
          "summary": "RHBZ#2107465",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107465"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28693"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html"
        }
      ],
      "release_date": "2022-07-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: Intel: information disclosure via local access"
    },
    {
      "cve": "CVE-2022-28893",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-04-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074208"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s net/sunrpc/xprt.c function in the Remote Procedure Call (SunRPC) protocol. This flaw allows a local attacker to crash the system, leading to a kernel information leak issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free in SUNRPC subsystem",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074208",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074208"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28893",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/04/11/3",
          "url": "http://www.openwall.com/lists/oss-security/2022/04/11/3"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/04/11/4",
          "url": "http://www.openwall.com/lists/oss-security/2022/04/11/4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"
        }
      ],
      "release_date": "2022-04-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected SUNRPC  driver (sunrpc) kernel module from loading during the boot time, ensuring the module is added to the blacklist file.\n~~~\nRefer:  \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free in SUNRPC subsystem"
    },
    {
      "cve": "CVE-2022-29581",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-05-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in u32_change in net/sched/cls_u32.c in the network subcomponent of the Linux kernel. This flaw allows a local attacker to crash the system, cause a privilege escalation, and leak kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping the impact Moderate, because only memory leak can happen by default, and both hard to reproduce (at least reproducer not exists yet).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29581",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8",
          "url": "https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8"
        }
      ],
      "release_date": "2022-04-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module cls_u32 from being loaded by blacklisting the module to prevent it from loading automatically. \n~~~\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Johannes Wikner",
            "Kaveh Razavi"
          ],
          "organization": "ETH Z\u00fcrich"
        }
      ],
      "cve": "CVE-2022-29900",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090226"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29900"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090226",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29900",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
        }
      ],
      "release_date": "2022-07-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kaveh Razavi",
            "Johannes Wikner"
          ],
          "organization": "ETH Zurich"
        }
      ],
      "cve": "CVE-2022-29901",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2022-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2103148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. Non-transparent sharing of branch predictor targets between contexts in some Intel(R) processors may potentially allow an authorized user to enable information disclosure via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29901"
        },
        {
          "category": "external",
          "summary": "RHBZ#2103148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29901",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html"
        }
      ],
      "release_date": "2022-07-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions"
    },
    {
      "cve": "CVE-2022-36946",
      "discovery_date": "2022-08-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2115278"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory corruption flaw was found in the Linux kernel\u2019s Netfilter subsystem in the way a local user uses the libnetfilter_queue when analyzing a corrupted network packet. This flaw allows a local user to crash the system or a remote user to crash the system when the libnetfilter_queue is used by a local user.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "RHBZ#2115278",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115278"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36946",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/",
          "url": "https://lore.kernel.org/all/20220726104206.2036-1-fw@strlen.de/t/"
        }
      ],
      "release_date": "2022-07-26T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module nfnetlink_queue from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blocklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c"
    },
    {
      "cve": "CVE-2022-39190",
      "cwe": {
        "id": "CWE-392",
        "name": "Missing Report of Error Condition"
      },
      "discovery_date": "2022-09-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2129152"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in net/netfilter/nf_tables_api.c in the Linux kernel. A denial of service can occur upon binding to an already bound chain.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nf_tables disallow binding to already bound chain",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "RHBZ#2129152",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129152"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39190",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220824220330.64283-12-pablo@netfilter.org/",
          "url": "https://lore.kernel.org/all/20220824220330.64283-12-pablo@netfilter.org/"
        }
      ],
      "release_date": "2022-08-21T22:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nf_tables disallow binding to already bound chain"
    },
    {
      "cve": "CVE-2022-42432",
      "cwe": {
        "id": "CWE-457",
        "name": "Use of Uninitialized Variable"
      },
      "discovery_date": "2023-03-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2182888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the nft_osf_eval function in the netfilter subsystem of the Linux kernel. This issue results from the lack of proper initialization of memory prior to accessing it, and could allow a local privileged user to leak stale kernel stack data to userspace.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: netfilter: nfnetlink_osf: uninitialized variable information disclosure vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6, 7 and 8 are not affected by this flaw as they did not include support for Netfilter OSF over nfnetlink (CONFIG_NETFILTER_NETLINK_OSF).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42432"
        },
        {
          "category": "external",
          "summary": "RHBZ#2182888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42432",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42432"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42432",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42432"
        },
        {
          "category": "external",
          "summary": "https://www.zerodayinitiative.com/advisories/ZDI-22-1457",
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1457"
        }
      ],
      "release_date": "2022-09-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: netfilter: nfnetlink_osf: uninitialized variable information disclosure vulnerability"
    },
    {
      "cve": "CVE-2022-48905",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-08-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2307158"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s IBM Virtual Network Interface Controller (ibmvnic ) driver. This issue involved not properly freeing memory associated with a reset work item when the reset work queue is flushed, causing the reset-work-item not to be deallocated. This flaw allows an attacker with control over the virtual NIC to repeatedly trigger interface resets to cause small amounts of memory to leak. Over time, this can lead to memory exhaustion, especially in systems already resource-constrained or under heavy load, resulting in a possible denial of service (DoS) condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ibmvnic: free reset-work-item when flushing",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48905"
        },
        {
          "category": "external",
          "summary": "RHBZ#2307158",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307158"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48905",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48905"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48905",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48905"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48905-4c70@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48905-4c70@gregkh/T"
        }
      ],
      "release_date": "2024-08-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: ibmvnic: free reset-work-item when flushing"
    },
    {
      "cve": "CVE-2022-48918",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-08-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2307171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service vulnerability was found in the Linux kernel. When debugfs is set as off in the kernel command line, iwiwifi\u0027s mvm module uses an invalid/unchecked debugfs_dir pointer, resulting in disruption to availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: iwlwifi: mvm: check debugfs_dir ptr before use",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48918"
        },
        {
          "category": "external",
          "summary": "RHBZ#2307171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48918",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48918"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48918",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48918"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024082217-CVE-2022-48918-9b85@gregkh/T"
        }
      ],
      "release_date": "2024-08-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: iwlwifi: mvm: check debugfs_dir ptr before use"
    },
    {
      "cve": "CVE-2022-48936",
      "discovery_date": "2024-08-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2307192"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngso: do not skip outer ip header in case of ipip and net_failover\n\nWe encounter a tcp drop issue in our cloud environment. Packet GROed in\nhost forwards to a VM virtio_net nic with net_failover enabled. VM acts\nas a IPVS LB with ipip encapsulation. The full path like:\nhost gro -\u003e vm virtio_net rx -\u003e net_failover rx -\u003e ipvs fullnat\n -\u003e ipip encap -\u003e net_failover tx -\u003e virtio_net tx\n\nWhen net_failover transmits a ipip pkt (gso_type = 0x0103, which means\nSKB_GSO_TCPV4, SKB_GSO_DODGY and SKB_GSO_IPXIP4), there is no gso\ndid because it supports TSO and GSO_IPXIP4. But network_header points to\ninner ip header.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: gso: do not skip outer ip header in case of ipip and net_failover",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE has been rejected at upstream - https://lore.kernel.org/linux-cve-announce/2024083059-REJECTED-7912@gregkh/T/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48936"
        },
        {
          "category": "external",
          "summary": "RHBZ#2307192",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307192"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48936",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48936"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48936",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48936"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48936-9302@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48936-9302@gregkh/T"
        }
      ],
      "release_date": "2024-08-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 0.0,
            "baseSeverity": "NONE",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: gso: do not skip outer ip header in case of ipip and net_failover"
    },
    {
      "cve": "CVE-2023-1095",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2173973"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1095"
        },
        {
          "category": "external",
          "summary": "RHBZ#2173973",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173973"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1095",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095"
        }
      ],
      "release_date": "2022-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head"
    },
    {
      "cve": "CVE-2023-2008",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "discovery_date": "2023-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2186862"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s udmabuf device driver, within a fault handler. This issue occurs due to the lack of proper validation of user-supplied data, which can result in memory access past the end of an array. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: udmabuf: improper validation of array index leading to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6, 7, and 8 are not affected by this flaw as they did not include support for the userspace dmabuf misc driver (CONFIG_UDMABUF is not set).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
          "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
          "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2008"
        },
        {
          "category": "external",
          "summary": "RHBZ#2186862",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186862"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2008",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2008"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008"
        },
        {
          "category": "external",
          "summary": "https://www.zerodayinitiative.com/advisories/ZDI-23-441/",
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-441/"
        }
      ],
      "release_date": "2023-04-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T11:38:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7933"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "NFV-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "NFV-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.src",
            "RT-9.1.0.GA:kernel-rt-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-core-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-devel-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-kvm-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64",
            "RT-9.1.0.GA:kernel-rt-modules-extra-0:5.14.0-162.6.1.rt21.168.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: udmabuf: improper validation of array index leading to local privilege escalation"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.