RHSA-2023:2148

Vulnerability from csaf_redhat - Published: 2023-05-09 10:01 - Updated: 2026-03-30 10:28
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Severity
Important
Notes
Topic: An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461) * hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341) * malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655) * possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462) * KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789) * use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882) * KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196) * netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663) * race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028) * out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435) * race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522) * memory leak in ipv6_renew_options() (CVE-2022-3524) * data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566) * data races around sk->sk_prot (CVE-2022-3567) * memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619) * denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623) * use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625) * USB-accessible buffer overflow in brcmfmac (CVE-2022-3628) * use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640) * Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707) * mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128) * l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129) * igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141) * lockdown bypass using IMA (CVE-2022-21505) * double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388) * network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743) * unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188) * TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189) * u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674) * use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) * use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720) * BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721) * Denial of service in beacon protection for P2P-device (CVE-2022-42722) * memory corruption in usbmon driver (CVE-2022-43750) * NULL pointer dereference in traffic control subsystem (CVE-2022-47929) * NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394) * use-after-free due to race condition in qdisc_graft() (CVE-2023-0590) * use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195) * denial of service in tipc_conn_close (CVE-2023-1382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.

CWE-1037 - Processor Optimization Removal or Modification of Security-critical Code
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A flaw was found in the openEuler kernel in Linux filesystem modules that allows an integer overflow via mounting a corrupted filesystem. This issue affects the openEuler kernel in versions from 4.19.90 through 4.19.90-2401.3 and 5.10.0-60.18.0 through 5.10.0-183.0.0.

CWE-190 - Integer Overflow or Wraparound
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE-787 - Out-of-bounds Write
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A vulnerability was found in the Linux kernel's mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A vulnerability was found in the Linux kernel's net component in the stmmac driver, where improper deletion of VLAN priority filters caused a kernel NULL pointer dereference which occurs during the deletion of specific tc flower records, leading to potential system crashes.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.

CWE-125 - Out-of-bounds Read
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A flaw was found in the KVM's Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.

CWE-1188 - Initialization of a Resource with an Insecure Default
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround This vulnerability can be mitigated by disabling the nested virtualization feature: ``` # modprobe -r kvm_intel # modprobe kvm_intel nested=0 ```

A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.

CWE-923 - Improper Restriction of Communication Channel to Intended Endpoints
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

CWE-787 - Out-of-bounds Write
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

An out-of-bounds memory read flaw was found in the Linux kernel. The IPv4 Handler component may delete IPv4 routes containing a multipath spec while the fib_info is using a nexthop object. This issue allows a local attacker access to unauthorized data.

CWE-125 - Out-of-bounds Read
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround No known mitigation available.

A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.

CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A memory leak flaw was found in the Linux kernel’s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.

CWE-401 - Missing Release of Memory after Effective Lifetime
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk->icsk_af_ops. This issue could allow an attacker to leak internal kernel information.

CWE-366 - Race Condition within a Thread
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A data race problem was found in sk->sk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.

CWE-421 - Race Condition During Access to Alternate Channel
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A memory leak flaw was found in the Linux kernel’s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.

CWE-401 - Missing Release of Memory after Effective Lifetime
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293. Alternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.

A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.

CWE-123 - Write-what-where Condition
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.

CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

A vulnerability was found in the Linux Kernel in the l2cap_conn_del in net/bluetooth/l2cap_core.c function in the Bluetooth component. This issue leads to a use-after-free problem.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.

CWE-415 - Double Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A NULL pointer dereference issue was discovered in the Linux kernel. This issue occurs in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could potentially crash the system, causing a denial of service.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.

CWE-413 - Improper Resource Locking
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.

CWE-455 - Non-exit on Failed Initialization
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A use-after-free flaw was found in the Linux kernel’s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE-667 - Improper Locking
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

An authentication bypass flaw was found in the Linux kernel’s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE-305 - Authentication Bypass by Primary Weakness
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A double-free flaw was found in the Linux kernel's USB2CAN interface implementation. This issue could allow a local user to crash the system.

CWE-415 - Double Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate this issue, prevent module usb_8dev from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

An incomplete cleanup flaw was found in the Linux kernel’s Xen networking XDP (eXpress Data Path) subsystem. This flaw allows a local user to crash the system.

CWE-459 - Incomplete Cleanup
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

An out-of-bounds memory write vulnerability was found in the Linux kernel's vmwgfx driver in vmw_kms_cursor_snoop due to a missing check of a memcpy length. This flaw allows a local, unprivileged attacker with access to either the /dev/dri/card0 or /dev/dri/rendererD128 and able to issue an ioctl() on the resulting file descriptor, to crash the system, causing a denial of service.

CWE-787 - Out-of-bounds Write
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the vmwgfx kernel module. For instructions relating to blacklisting a kernel module, please see https://access.redhat.com/solutions/41278.

A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.

CWE-911 - Improper Update of Reference Count
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.

CWE-368 - Context Switching Race Condition
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel’s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.

CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.

A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.

CWE-20 - Improper Input Validation
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.

CWE-705 - Incorrect Control Flow Scoping
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

A use-after-free flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround This flaw can be mitigated by disabling Bluetooth on the operating system level. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. For instructions on how to disable Bluetooth on RHEL please refer to https://access.redhat.com/solutions/2682931. Alternatively Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.

An out-of-bounds memory write flaw in the Linux kernel’s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE-787 - Out-of-bounds Write
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0: ``` # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf ```

A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround This flaw can be mitigated by preventing the affected transparent inter-process communication (TIPC) protocol kernel module from loading during the boot time. Ensure the module is added into the blacklist file. ~~~ Refer: How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278 ~~~

A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.

CWE-476 - NULL Pointer Dereference
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw allows a privileged local user to cause a system crash or other undefined behaviors.

CWE-416 - Use After Free
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).

CWE-436 - Interpretation Conflict
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148

A flaw in the routing table size was found in the ICMPv6 handling of "Packet Too Big". The size of the routing table is regulated by periodic garbage collection. However, with "Packet Too Big Messages" it is possible to exceed the routing table size and garbage collector threshold. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2023:2148
References
https://access.redhat.com/errata/RHSA-2023:2148 self
https://access.redhat.com/security/updates/classi… external
https://access.redhat.com/documentation/en-us/red… external
https://bugzilla.redhat.com/show_bug.cgi?id=2061703 external
https://bugzilla.redhat.com/show_bug.cgi?id=2073091 external
https://bugzilla.redhat.com/show_bug.cgi?id=2078466 external
https://bugzilla.redhat.com/show_bug.cgi?id=2089701 external
https://bugzilla.redhat.com/show_bug.cgi?id=2090723 external
https://bugzilla.redhat.com/show_bug.cgi?id=2106830 external
https://bugzilla.redhat.com/show_bug.cgi?id=2107924 external
https://bugzilla.redhat.com/show_bug.cgi?id=2108691 external
https://bugzilla.redhat.com/show_bug.cgi?id=2114937 external
https://bugzilla.redhat.com/show_bug.cgi?id=2122228 external
https://bugzilla.redhat.com/show_bug.cgi?id=2123056 external
https://bugzilla.redhat.com/show_bug.cgi?id=2124788 external
https://bugzilla.redhat.com/show_bug.cgi?id=2130141 external
https://bugzilla.redhat.com/show_bug.cgi?id=2133483 external
https://bugzilla.redhat.com/show_bug.cgi?id=2133490 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134377 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134380 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134451 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134506 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134517 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134528 external
https://bugzilla.redhat.com/show_bug.cgi?id=2137979 external
https://bugzilla.redhat.com/show_bug.cgi?id=2139610 external
https://bugzilla.redhat.com/show_bug.cgi?id=2143893 external
https://bugzilla.redhat.com/show_bug.cgi?id=2143943 external
https://bugzilla.redhat.com/show_bug.cgi?id=2144720 external
https://bugzilla.redhat.com/show_bug.cgi?id=2147364 external
https://bugzilla.redhat.com/show_bug.cgi?id=2150947 external
https://bugzilla.redhat.com/show_bug.cgi?id=2150960 external
https://bugzilla.redhat.com/show_bug.cgi?id=2150979 external
https://bugzilla.redhat.com/show_bug.cgi?id=2151270 external
https://bugzilla.redhat.com/show_bug.cgi?id=2154171 external
https://bugzilla.redhat.com/show_bug.cgi?id=2154235 external
https://bugzilla.redhat.com/show_bug.cgi?id=2160023 external
https://bugzilla.redhat.com/show_bug.cgi?id=2162120 external
https://bugzilla.redhat.com/show_bug.cgi?id=2165721 external
https://bugzilla.redhat.com/show_bug.cgi?id=2165741 external
https://bugzilla.redhat.com/show_bug.cgi?id=2168246 external
https://bugzilla.redhat.com/show_bug.cgi?id=2176192 external
https://bugzilla.redhat.com/show_bug.cgi?id=2177371 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2021-26341 self
https://bugzilla.redhat.com/show_bug.cgi?id=2061703 external
https://www.cve.org/CVERecord?id=CVE-2021-26341 external
https://nvd.nist.gov/vuln/detail/CVE-2021-26341 external
https://grsecurity.net/amd_branch_mispredictor_pa… external
https://www.amd.com/en/corporate/product-security… external
https://www.amd.com/system/files/documents/softwa… external
https://access.redhat.com/security/cve/CVE-2021-33631 self
https://bugzilla.redhat.com/show_bug.cgi?id=2261976 external
https://www.cve.org/CVERecord?id=CVE-2021-33631 external
https://nvd.nist.gov/vuln/detail/CVE-2021-33631 external
https://seclists.org/oss-sec/2024/q1/65 external
https://access.redhat.com/security/cve/CVE-2021-33655 self
https://bugzilla.redhat.com/show_bug.cgi?id=2108691 external
https://www.cve.org/CVERecord?id=CVE-2021-33655 external
https://nvd.nist.gov/vuln/detail/CVE-2021-33655 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://access.redhat.com/security/cve/CVE-2021-47560 self
https://bugzilla.redhat.com/show_bug.cgi?id=2283389 external
https://www.cve.org/CVERecord?id=CVE-2021-47560 external
https://nvd.nist.gov/vuln/detail/CVE-2021-47560 external
https://lore.kernel.org/linux-cve-announce/202405… external
https://access.redhat.com/security/cve/CVE-2021-47592 self
https://bugzilla.redhat.com/show_bug.cgi?id=2293235 external
https://www.cve.org/CVERecord?id=CVE-2021-47592 external
https://nvd.nist.gov/vuln/detail/CVE-2021-47592 external
https://lore.kernel.org/linux-cve-announce/202406… external
https://access.redhat.com/security/cve/CVE-2022-1462 self
https://bugzilla.redhat.com/show_bug.cgi?id=2078466 external
https://www.cve.org/CVERecord?id=CVE-2022-1462 external
https://nvd.nist.gov/vuln/detail/CVE-2022-1462 external
https://seclists.org/oss-sec/2022/q2/155 external
https://access.redhat.com/security/cve/CVE-2022-1789 self
https://bugzilla.redhat.com/show_bug.cgi?id=2090723 external
https://www.cve.org/CVERecord?id=CVE-2022-1789 external
https://nvd.nist.gov/vuln/detail/CVE-2022-1789 external
https://github.com/advisories/GHSA-v8pq-23qj-q7x7 external
https://www.openwall.com/lists/oss-security/2022/… external
https://access.redhat.com/security/cve/CVE-2022-1882 self
https://bugzilla.redhat.com/show_bug.cgi?id=2089701 external
https://www.cve.org/CVERecord?id=CVE-2022-1882 external
https://nvd.nist.gov/vuln/detail/CVE-2022-1882 external
https://git.kernel.org/linus/353f7988dd8413c4 external
https://access.redhat.com/security/cve/CVE-2022-2196 self
https://bugzilla.redhat.com/show_bug.cgi?id=2160023 external
https://www.cve.org/CVERecord?id=CVE-2022-2196 external
https://nvd.nist.gov/vuln/detail/CVE-2022-2196 external
https://access.redhat.com/security/cve/CVE-2022-2663 self
https://bugzilla.redhat.com/show_bug.cgi?id=2123056 external
https://www.cve.org/CVERecord?id=CVE-2022-2663 external
https://nvd.nist.gov/vuln/detail/CVE-2022-2663 external
https://lore.kernel.org/netfilter-devel/202208260… external
https://access.redhat.com/security/cve/CVE-2022-3028 self
https://bugzilla.redhat.com/show_bug.cgi?id=2122228 external
https://www.cve.org/CVERecord?id=CVE-2022-3028 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3028 external
https://github.com/torvalds/linux/commit/ba953a9d… external
https://access.redhat.com/security/cve/CVE-2022-3435 self
https://bugzilla.redhat.com/show_bug.cgi?id=2133490 external
https://www.cve.org/CVERecord?id=CVE-2022-3435 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3435 external
https://lore.kernel.org/netdev/20221005181257.889… external
https://access.redhat.com/security/cve/CVE-2022-3522 self
https://bugzilla.redhat.com/show_bug.cgi?id=2150979 external
https://www.cve.org/CVERecord?id=CVE-2022-3522 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3522 external
https://lore.kernel.org/all/20221004193400.110155… external
https://access.redhat.com/security/cve/CVE-2022-3524 self
https://bugzilla.redhat.com/show_bug.cgi?id=2150947 external
https://www.cve.org/CVERecord?id=CVE-2022-3524 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3524 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://access.redhat.com/security/cve/CVE-2022-3566 self
https://bugzilla.redhat.com/show_bug.cgi?id=2143893 external
https://www.cve.org/CVERecord?id=CVE-2022-3566 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3566 external
https://git.kernel.org/pub/scm/linux/kernel/git/s… external
https://access.redhat.com/security/cve/CVE-2022-3567 self
https://bugzilla.redhat.com/show_bug.cgi?id=2143943 external
https://www.cve.org/CVERecord?id=CVE-2022-3567 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3567 external
https://git.kernel.org/pub/scm/linux/kernel/git/s… external
https://access.redhat.com/security/cve/CVE-2022-3619 self
https://bugzilla.redhat.com/show_bug.cgi?id=2154235 external
https://www.cve.org/CVERecord?id=CVE-2022-3619 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3619 external
https://git.kernel.org/pub/scm/linux/kernel/git/b… external
https://vuldb.com/?id.211918 external
https://access.redhat.com/security/cve/CVE-2022-3623 self
https://bugzilla.redhat.com/show_bug.cgi?id=2165721 external
https://www.cve.org/CVERecord?id=CVE-2022-3623 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3623 external
https://git.kernel.org/pub/scm/linux/kernel/git/b… external
https://access.redhat.com/security/cve/CVE-2022-3625 self
https://bugzilla.redhat.com/show_bug.cgi?id=2144720 external
https://www.cve.org/CVERecord?id=CVE-2022-3625 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3625 external
https://git.kernel.org/pub/scm/linux/kernel/git/k… external
https://access.redhat.com/security/cve/CVE-2022-3628 self
https://bugzilla.redhat.com/show_bug.cgi?id=2150960 external
https://www.cve.org/CVERecord?id=CVE-2022-3628 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3628 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://seclists.org/oss-sec/2022/q4/60 external
https://access.redhat.com/security/cve/CVE-2022-3640 self
https://bugzilla.redhat.com/show_bug.cgi?id=2139610 external
https://www.cve.org/CVERecord?id=CVE-2022-3640 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3640 external
https://git.kernel.org/pub/scm/linux/kernel/git/b… external
https://access.redhat.com/security/cve/CVE-2022-3707 self
https://bugzilla.redhat.com/show_bug.cgi?id=2137979 external
https://www.cve.org/CVERecord?id=CVE-2022-3707 external
https://nvd.nist.gov/vuln/detail/CVE-2022-3707 external
https://lore.kernel.org/all/20221007013708.194606… external
https://access.redhat.com/security/cve/CVE-2022-4128 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134380 external
https://www.cve.org/CVERecord?id=CVE-2022-4128 external
https://nvd.nist.gov/vuln/detail/CVE-2022-4128 external
https://access.redhat.com/security/cve/CVE-2022-4129 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134528 external
https://www.cve.org/CVERecord?id=CVE-2022-4129 external
https://nvd.nist.gov/vuln/detail/CVE-2022-4129 external
https://access.redhat.com/security/cve/CVE-2022-4662 self
https://bugzilla.redhat.com/show_bug.cgi?id=2155788 external
https://www.cve.org/CVERecord?id=CVE-2022-4662 external
https://nvd.nist.gov/vuln/detail/CVE-2022-4662 external
https://lore.kernel.org/all/20220913140355.910732… external
https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-… external
https://access.redhat.com/security/cve/CVE-2022-20141 self
https://bugzilla.redhat.com/show_bug.cgi?id=2114937 external
https://www.cve.org/CVERecord?id=CVE-2022-20141 external
https://nvd.nist.gov/vuln/detail/CVE-2022-20141 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://access.redhat.com/security/cve/CVE-2022-21505 self
https://bugzilla.redhat.com/show_bug.cgi?id=2106830 external
https://www.cve.org/CVERecord?id=CVE-2022-21505 external
https://nvd.nist.gov/vuln/detail/CVE-2022-21505 external
https://access.redhat.com/security/cve/CVE-2022-28388 self
https://bugzilla.redhat.com/show_bug.cgi?id=2073091 external
https://www.cve.org/CVERecord?id=CVE-2022-28388 external
https://nvd.nist.gov/vuln/detail/CVE-2022-28388 external
https://access.redhat.com/security/cve/CVE-2022-33743 self
https://bugzilla.redhat.com/show_bug.cgi?id=2107924 external
https://www.cve.org/CVERecord?id=CVE-2022-33743 external
https://nvd.nist.gov/vuln/detail/CVE-2022-33743 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://www.openwall.com/lists/oss-security/2022/… external
https://access.redhat.com/security/cve/CVE-2022-36280 self
https://bugzilla.redhat.com/show_bug.cgi?id=2133450 external
https://www.cve.org/CVERecord?id=CVE-2022-36280 external
https://nvd.nist.gov/vuln/detail/CVE-2022-36280 external
https://access.redhat.com/security/cve/CVE-2022-36879 self
https://bugzilla.redhat.com/show_bug.cgi?id=2119855 external
https://www.cve.org/CVERecord?id=CVE-2022-36879 external
https://nvd.nist.gov/vuln/detail/CVE-2022-36879 external
https://access.redhat.com/security/cve/CVE-2022-39188 self
https://bugzilla.redhat.com/show_bug.cgi?id=2130141 external
https://www.cve.org/CVERecord?id=CVE-2022-39188 external
https://nvd.nist.gov/vuln/detail/CVE-2022-39188 external
https://bugs.chromium.org/p/project-zero/issues/d… external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://lore.kernel.org/stable/20220831191348.338… external
https://access.redhat.com/security/cve/CVE-2022-39189 self
https://bugzilla.redhat.com/show_bug.cgi?id=2124788 external
https://www.cve.org/CVERecord?id=CVE-2022-39189 external
https://nvd.nist.gov/vuln/detail/CVE-2022-39189 external
https://bugs.chromium.org/p/project-zero/issues/d… external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://access.redhat.com/security/cve/CVE-2022-41674 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134377 external
https://www.cve.org/CVERecord?id=CVE-2022-41674 external
https://nvd.nist.gov/vuln/detail/CVE-2022-41674 external
https://www.openwall.com/lists/oss-security/2022/… external
https://access.redhat.com/security/cve/CVE-2022-42703 self
https://bugzilla.redhat.com/show_bug.cgi?id=2133483 external
https://www.cve.org/CVERecord?id=CVE-2022-42703 external
https://nvd.nist.gov/vuln/detail/CVE-2022-42703 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://access.redhat.com/security/cve/CVE-2022-42720 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134451 external
https://www.cve.org/CVERecord?id=CVE-2022-42720 external
https://nvd.nist.gov/vuln/detail/CVE-2022-42720 external
https://access.redhat.com/security/cve/CVE-2022-42721 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134506 external
https://www.cve.org/CVERecord?id=CVE-2022-42721 external
https://nvd.nist.gov/vuln/detail/CVE-2022-42721 external
https://access.redhat.com/security/cve/CVE-2022-42722 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134517 external
https://www.cve.org/CVERecord?id=CVE-2022-42722 external
https://nvd.nist.gov/vuln/detail/CVE-2022-42722 external
https://access.redhat.com/security/cve/CVE-2022-42896 self
https://bugzilla.redhat.com/show_bug.cgi?id=2147364 external
https://www.cve.org/CVERecord?id=CVE-2022-42896 external
https://nvd.nist.gov/vuln/detail/CVE-2022-42896 external
https://github.com/google/security-research/secur… external
https://access.redhat.com/security/cve/CVE-2022-43750 self
https://bugzilla.redhat.com/show_bug.cgi?id=2151270 external
https://www.cve.org/CVERecord?id=CVE-2022-43750 external
https://nvd.nist.gov/vuln/detail/CVE-2022-43750 external
https://github.com/torvalds/linux/commit/a659daf6… external
https://access.redhat.com/security/cve/CVE-2022-47929 self
https://bugzilla.redhat.com/show_bug.cgi?id=2168246 external
https://www.cve.org/CVERecord?id=CVE-2022-47929 external
https://nvd.nist.gov/vuln/detail/CVE-2022-47929 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://access.redhat.com/security/cve/CVE-2022-48695 self
https://bugzilla.redhat.com/show_bug.cgi?id=2278999 external
https://www.cve.org/CVERecord?id=CVE-2022-48695 external
https://nvd.nist.gov/vuln/detail/CVE-2022-48695 external
https://lore.kernel.org/linux-cve-announce/202405… external
https://access.redhat.com/security/cve/CVE-2023-0394 self
https://bugzilla.redhat.com/show_bug.cgi?id=2162120 external
https://www.cve.org/CVERecord?id=CVE-2023-0394 external
https://nvd.nist.gov/vuln/detail/CVE-2023-0394 external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
https://www.openwall.com/lists/oss-security/2023/… external
https://access.redhat.com/security/cve/CVE-2023-0461 self
https://bugzilla.redhat.com/show_bug.cgi?id=2176192 external
https://www.cve.org/CVERecord?id=CVE-2023-0461 external
https://nvd.nist.gov/vuln/detail/CVE-2023-0461 external
https://github.com/torvalds/linux/commit/2c02d41d… external
https://access.redhat.com/security/cve/CVE-2023-0590 self
https://bugzilla.redhat.com/show_bug.cgi?id=2165741 external
https://www.cve.org/CVERecord?id=CVE-2023-0590 external
https://nvd.nist.gov/vuln/detail/CVE-2023-0590 external
https://lore.kernel.org/all/20221018203258.279328… external
https://access.redhat.com/security/cve/CVE-2023-1195 self
https://bugzilla.redhat.com/show_bug.cgi?id=2154171 external
https://www.cve.org/CVERecord?id=CVE-2023-1195 external
https://nvd.nist.gov/vuln/detail/CVE-2023-1195 external
https://github.com/torvalds/linux/commit/153695d3… external
https://access.redhat.com/security/cve/CVE-2023-1382 self
https://bugzilla.redhat.com/show_bug.cgi?id=2177371 external
https://www.cve.org/CVERecord?id=CVE-2023-1382 external
https://nvd.nist.gov/vuln/detail/CVE-2023-1382 external
https://lore.kernel.org/netdev/bc7bd3183f1c275c82… external
https://access.redhat.com/security/cve/CVE-2023-2177 self
https://bugzilla.redhat.com/show_bug.cgi?id=2187953 external
https://www.cve.org/CVERecord?id=CVE-2023-2177 external
https://nvd.nist.gov/vuln/detail/CVE-2023-2177 external
https://git.kernel.org/pub/scm/linux/kernel/git/n… external
https://access.redhat.com/security/cve/CVE-2023-2513 self
https://bugzilla.redhat.com/show_bug.cgi?id=2193097 external
https://www.cve.org/CVERecord?id=CVE-2023-2513 external
https://nvd.nist.gov/vuln/detail/CVE-2023-2513 external
https://access.redhat.com/security/cve/CVE-2023-22998 self
https://bugzilla.redhat.com/show_bug.cgi?id=2182429 external
https://www.cve.org/CVERecord?id=CVE-2023-22998 external
https://nvd.nist.gov/vuln/detail/CVE-2023-22998 external
https://access.redhat.com/security/cve/CVE-2023-52340 self
https://bugzilla.redhat.com/show_bug.cgi?id=2257979 external
https://www.cve.org/CVERecord?id=CVE-2023-52340 external
https://nvd.nist.gov/vuln/detail/CVE-2023-52340 external
https://alas.aws.amazon.com/cve/html/CVE-2023-523… external
https://git.kernel.org/pub/scm/linux/kernel/git/t… external
Acknowledgments
AMD
Harbin Institute of Technology Qiuhao Li
Zhejiang University Yongkang Jia Gaoning Pan
elijahbai
Kyle Zeng
Google Project Zero Jann Horn
DEVCORE Internship Program, and NYCU Software Security LAB Pumpkin (@u1f383)
Wei Chen

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)\n\n* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)\n\n* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)\n\n* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)\n\n* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)\n\n* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)\n\n* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)\n\n* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)\n\n* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)\n\n* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)\n\n* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)\n\n* memory leak in ipv6_renew_options() (CVE-2022-3524)\n\n* data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)\n\n* data races around sk-\u003esk_prot (CVE-2022-3567)\n\n* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)\n\n* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)\n\n* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)\n\n* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)\n\n* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)\n\n* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)\n\n* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)\n\n* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)\n\n* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)\n\n* lockdown bypass using IMA (CVE-2022-21505)\n\n* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)\n\n* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)\n\n* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)\n\n* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)\n\n* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)\n\n* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)\n\n* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)\n\n* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)\n\n* Denial of service in beacon protection for P2P-device (CVE-2022-42722)\n\n* memory corruption in usbmon driver (CVE-2022-43750)\n\n* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)\n\n* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)\n\n* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)\n\n* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)\n\n* denial of service in tipc_conn_close (CVE-2023-1382)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2148",
        "url": "https://access.redhat.com/errata/RHSA-2023:2148"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2061703",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
      },
      {
        "category": "external",
        "summary": "2073091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073091"
      },
      {
        "category": "external",
        "summary": "2078466",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
      },
      {
        "category": "external",
        "summary": "2089701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701"
      },
      {
        "category": "external",
        "summary": "2090723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
      },
      {
        "category": "external",
        "summary": "2106830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106830"
      },
      {
        "category": "external",
        "summary": "2107924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107924"
      },
      {
        "category": "external",
        "summary": "2108691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
      },
      {
        "category": "external",
        "summary": "2114937",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
      },
      {
        "category": "external",
        "summary": "2122228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
      },
      {
        "category": "external",
        "summary": "2123056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
      },
      {
        "category": "external",
        "summary": "2124788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
      },
      {
        "category": "external",
        "summary": "2130141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
      },
      {
        "category": "external",
        "summary": "2133483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
      },
      {
        "category": "external",
        "summary": "2133490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133490"
      },
      {
        "category": "external",
        "summary": "2134377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
      },
      {
        "category": "external",
        "summary": "2134380",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134380"
      },
      {
        "category": "external",
        "summary": "2134451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
      },
      {
        "category": "external",
        "summary": "2134506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
      },
      {
        "category": "external",
        "summary": "2134517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
      },
      {
        "category": "external",
        "summary": "2134528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
      },
      {
        "category": "external",
        "summary": "2137979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
      },
      {
        "category": "external",
        "summary": "2139610",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610"
      },
      {
        "category": "external",
        "summary": "2143893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
      },
      {
        "category": "external",
        "summary": "2143943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
      },
      {
        "category": "external",
        "summary": "2144720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
      },
      {
        "category": "external",
        "summary": "2147364",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364"
      },
      {
        "category": "external",
        "summary": "2150947",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
      },
      {
        "category": "external",
        "summary": "2150960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
      },
      {
        "category": "external",
        "summary": "2150979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
      },
      {
        "category": "external",
        "summary": "2151270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
      },
      {
        "category": "external",
        "summary": "2154171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
      },
      {
        "category": "external",
        "summary": "2154235",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
      },
      {
        "category": "external",
        "summary": "2160023",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
      },
      {
        "category": "external",
        "summary": "2162120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
      },
      {
        "category": "external",
        "summary": "2165721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
      },
      {
        "category": "external",
        "summary": "2165741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741"
      },
      {
        "category": "external",
        "summary": "2168246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
      },
      {
        "category": "external",
        "summary": "2176192",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
      },
      {
        "category": "external",
        "summary": "2177371",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177371"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2148.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2026-03-30T10:28:36+00:00",
      "generator": {
        "date": "2026-03-30T10:28:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.4"
        }
      },
      "id": "RHSA-2023:2148",
      "initial_release_date": "2023-05-09T10:01:50+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T10:01:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T10:01:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-03-30T10:28:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux NFV (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux NFV (v. 9)",
                  "product_id": "NFV-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux RT (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux RT (v. 9)",
                  "product_id": "RT-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
                "product": {
                  "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
                  "product_id": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296.el9_2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-284.11.1.rt14.296.el9_2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 9)",
          "product_id": "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "NFV-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64 as a component of Red Hat Enterprise Linux RT (v. 9)",
          "product_id": "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
        "relates_to_product_reference": "RT-9.2.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "AMD"
          ]
        }
      ],
      "cve": "CVE-2021-26341",
      "cwe": {
        "id": "CWE-1037",
        "name": "Processor Optimization Removal or Modification of Security-critical Code"
      },
      "discovery_date": "2022-03-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2061703"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "RHBZ#2061703",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061703"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26341",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26341"
        },
        {
          "category": "external",
          "summary": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before",
          "url": "https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf",
          "url": "https://www.amd.com/system/files/documents/software-techniques-for-managing-speculation.pdf"
        }
      ],
      "release_date": "2022-03-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch"
    },
    {
      "cve": "CVE-2021-33631",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2024-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2261976"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the openEuler kernel in Linux filesystem modules that allows an integer overflow via mounting a corrupted filesystem. This issue affects the openEuler kernel in versions from 4.19.90 through 4.19.90-2401.3 and 5.10.0-60.18.0 through 5.10.0-183.0.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ext4: kernel bug in ext4_write_inline_data_end()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33631"
        },
        {
          "category": "external",
          "summary": "RHBZ#2261976",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261976"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33631",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33631",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33631"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2024/q1/65",
          "url": "https://seclists.org/oss-sec/2024/q1/65"
        }
      ],
      "release_date": "2024-01-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ext4: kernel bug in ext4_write_inline_data_end()"
    },
    {
      "cve": "CVE-2021-33655",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-07-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2108691"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "RHBZ#2108691",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108691"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4"
        }
      ],
      "release_date": "2022-07-08T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory"
    },
    {
      "cve": "CVE-2021-47560",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-05-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2283389"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47560"
        },
        {
          "category": "external",
          "summary": "RHBZ#2283389",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
        }
      ],
      "release_date": "2024-05-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
    },
    {
      "cve": "CVE-2021-47592",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2024-06-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2293235"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux kernel\u0027s net component in the stmmac driver, where improper deletion of VLAN priority filters caused a kernel NULL pointer dereference which occurs during the deletion of specific tc flower records, leading to potential system crashes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "RHBZ#2293235",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293235"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47592",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47592"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/T"
        }
      ],
      "release_date": "2024-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering"
    },
    {
      "cve": "CVE-2022-1462",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2078466"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible race condition in drivers/tty/tty_buffers.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2078466",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078466"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q2/155",
          "url": "https://seclists.org/oss-sec/2022/q2/155"
        }
      ],
      "release_date": "2022-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible race condition in drivers/tty/tty_buffers.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qiuhao Li"
          ],
          "organization": "Harbin Institute of Technology"
        },
        {
          "names": [
            "Yongkang Jia",
            "Gaoning Pan"
          ],
          "organization": "Zhejiang University"
        }
      ],
      "cve": "CVE-2022-1789",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-05-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2090723"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 did not provide support for INVPCID in shadow paging mode and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "RHBZ#2090723",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090723"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1789",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7",
          "url": "https://github.com/advisories/GHSA-v8pq-23qj-q7x7"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/05/25/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/05/25/2"
        }
      ],
      "release_date": "2022-05-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "elijahbai"
          ]
        }
      ],
      "cve": "CVE-2022-1882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2089701"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in free_pipe_info() could lead to privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "RHBZ#2089701",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089701"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1882",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/linus/353f7988dd8413c4",
          "url": "https://git.kernel.org/linus/353f7988dd8413c4"
        }
      ],
      "release_date": "2022-05-07T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in free_pipe_info() could lead to privilege escalation"
    },
    {
      "cve": "CVE-2022-2196",
      "cwe": {
        "id": "CWE-1188",
        "name": "Initialization of a Resource with an Insecure Default"
      },
      "discovery_date": "2023-01-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2160023"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the KVM\u0027s Intel nested virtualization feature (nVMX). Since L1 and L2 shared branch prediction modes (guest-user and guest-kernel), KVM did not protect indirect branches in L1 from steering by a malicious agent in L2. This could allow a malicious nested guest to carry out Spectre v2 attacks against L1 due to a missing IBPB at VM-exit time.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat currently provides the nested virtualization feature as a Technology Preview. Nested virtualization is therefore unsupported for production use. For more information please refer to https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2196"
        },
        {
          "category": "external",
          "summary": "RHBZ#2160023",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160023"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2196",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196"
        }
      ],
      "release_date": "2022-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_intel\n# modprobe kvm_intel nested=0\n```",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks"
    },
    {
      "cve": "CVE-2022-2663",
      "cwe": {
        "id": "CWE-923",
        "name": "Improper Restriction of Communication Channel to Intended Endpoints"
      },
      "discovery_date": "2022-08-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2123056"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and it incorrectly matches on the message. An attacker could exploit this vulnerability to bypass firewall when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: netfilter: nf_conntrack_irc message handling issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "RHBZ#2123056",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123056"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2663",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/",
          "url": "https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/"
        }
      ],
      "release_date": "2022-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the module nf_conntrack_irc from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: netfilter: nf_conntrack_irc message handling issue"
    },
    {
      "cve": "CVE-2022-3028",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-08-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2122228"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having a Moderate impact because it can only be triggered by a privileged local user (with CAP_NET_ADMIN or root).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "RHBZ#2122228",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122228"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5",
          "url": "https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5"
        }
      ],
      "release_date": "2022-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in xfrm_probe_algs can lead to OOB read/write"
    },
    {
      "cve": "CVE-2022-3435",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel. The IPv4 Handler component may delete IPv4 routes containing a multipath spec while the fib_info is using a nexthop object. This issue allows a local attacker access to unauthorized data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3435",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u",
          "url": "https://lore.kernel.org/netdev/20221005181257.8897-1-dsahern@kernel.org/T/#u"
        }
      ],
      "release_date": "2022-10-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "No known mitigation available.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c"
    },
    {
      "cve": "CVE-2022-3522",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2022-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in hugetlb_no_page in the mm/hugetlb.c file in the Linux Kernel, where a manipulation leads to a race condition. This flaw may allow a local attacker to cause a denial of service and can lead to a kernel information leak issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3522",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u",
          "url": "https://lore.kernel.org/all/20221004193400.110155-3-peterx@redhat.com/T/#u"
        }
      ],
      "release_date": "2022-10-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition in hugetlb_no_page() in mm/hugetlb.c"
    },
    {
      "cve": "CVE-2022-3524",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150947"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ipv6_renew_options()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150947",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150947"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11"
        }
      ],
      "release_date": "2022-10-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ipv6_renew_options()"
    },
    {
      "cve": "CVE-2022-3566",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "discovery_date": "2022-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2143893"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk-\u003eicsk_af_ops. This issue could allow an attacker to leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "RHBZ#2143893",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143893"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3566",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"
        }
      ],
      "release_date": "2022-10-06T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: data races around icsk-\u003eicsk_af_ops in do_ipv6_setsockopt"
    },
    {
      "cve": "CVE-2022-3567",
      "cwe": {
        "id": "CWE-421",
        "name": "Race Condition During Access to Alternate Channel"
      },
      "discovery_date": "2022-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2143943"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data race problem was found in sk-\u003esk_prot in the network subsystem in ipv6 in the Linux kernel. This issue occurs while some functions access critical data, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: data races around sk-\u003esk_prot",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "RHBZ#2143943",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143943"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6"
        }
      ],
      "release_date": "2022-10-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: data races around sk-\u003esk_prot"
    },
    {
      "cve": "CVE-2022-3619",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2154235"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in the Linux kernel\u2019s L2CAP bluetooth functionality. This issue occurs when a user generates malicious packets, triggering the l2cap_recv_acldata function. This flaw allows a local or bluetooth connection user to potentially crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "RHBZ#2154235",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154235"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3619",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211918",
          "url": "https://vuldb.com/?id.211918"
        }
      ],
      "release_date": "2022-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the customer portal at https://access.redhat.com/solutions/268293.\n\nAlternatively, bluetooth can be disabled within the hardware or at the BIOS level, which will also provide effective mitigation as the kernel will not detect Bluetooth hardware on the system.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-3623",
      "cwe": {
        "id": "CWE-123",
        "name": "Write-what-where Condition"
      },
      "discovery_date": "2023-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165721"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in follow_page_pte in mm/gup.c in the Linux Kernel. This issue occurs due to a race problem which can poison the page table entry and cause a denial-of-service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165721",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165721"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3623",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"
        }
      ],
      "release_date": "2022-09-01T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry"
    },
    {
      "cve": "CVE-2022-3625",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2144720"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Netlink device interface implementation in the Linux kernel that improperly handled certain error conditions, leading to a use-after-free issue with some network device drivers. A local attacker with admin access to the network device could use this to cause a denial of service (system crash) or execute arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free after failed devlink reload in devlink_param_get",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "RHBZ#2144720",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144720"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3625",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902"
        }
      ],
      "release_date": "2022-08-09T08:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free after failed devlink reload in devlink_param_get"
    },
    {
      "cve": "CVE-2022-3628",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-12-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2150960"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: USB-accessible buffer overflow in brcmfmac",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "RHBZ#2150960",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150960"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3628",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q4/60",
          "url": "https://seclists.org/oss-sec/2022/q4/60"
        }
      ],
      "release_date": "2022-10-22T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the brcmfmac module from being loaded. See https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: USB-accessible buffer overflow in brcmfmac"
    },
    {
      "cve": "CVE-2022-3640",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2139610"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux Kernel in the l2cap_conn_del in net/bluetooth/l2cap_core.c function in the Bluetooth component. This issue leads to a use-after-free problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "RHBZ#2139610",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139610"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3640",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"
        }
      ],
      "release_date": "2022-10-17T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-3707",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2137979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "RHBZ#2137979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3707",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/",
          "url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/"
        }
      ],
      "release_date": "2022-10-07T08:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed"
    },
    {
      "cve": "CVE-2022-4128",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-08-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134380"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was discovered in the Linux kernel. This issue occurs in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could potentially crash the system, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4128"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134380",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134380"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4128",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4128"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128"
        }
      ],
      "release_date": "2022-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time"
    },
    {
      "cve": "CVE-2022-4129",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "discovery_date": "2022-08-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134528"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134528",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134528"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4129",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129"
        }
      ],
      "release_date": "2022-08-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference"
    },
    {
      "cve": "CVE-2022-4662",
      "cwe": {
        "id": "CWE-455",
        "name": "Non-exit on Failed Initialization"
      },
      "discovery_date": "2022-12-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2155788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "RHBZ#2155788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4662",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/",
          "url": "https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/",
          "url": "https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/"
        }
      ],
      "release_date": "2022-09-13T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock"
    },
    {
      "cve": "CVE-2022-20141",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "discovery_date": "2022-08-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2114937"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s IGMP protocol in how a user triggers a race condition in the ip_check_mc_rcu function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "RHBZ#2114937",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114937"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20141",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19\u0026id=23d2b94043ca8835bd1e67749020e839f396a1c2"
        }
      ],
      "release_date": "2021-07-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets"
    },
    {
      "cve": "CVE-2022-21505",
      "cwe": {
        "id": "CWE-305",
        "name": "Authentication Bypass by Primary Weakness"
      },
      "discovery_date": "2022-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2106830"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An authentication bypass flaw was found in the Linux kernel\u2019s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: lockdown bypass using IMA",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-21505"
        },
        {
          "category": "external",
          "summary": "RHBZ#2106830",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106830"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21505",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505"
        }
      ],
      "release_date": "2022-07-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: lockdown bypass using IMA"
    },
    {
      "cve": "CVE-2022-28388",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "discovery_date": "2022-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2073091"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A double-free flaw was found in the Linux kernel\u0027s USB2CAN interface implementation. This issue could allow a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is Moderate because this case doesn\u0027t lead to a kernel crash as result of the pointers reference check preventing actual second memory free. The only known attack scenario is the possibility of a denial of service.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-28388"
        },
        {
          "category": "external",
          "summary": "RHBZ#2073091",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073091"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388"
        }
      ],
      "release_date": "2022-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module usb_8dev from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c"
    },
    {
      "cve": "CVE-2022-33743",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "discovery_date": "2022-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2107924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An incomplete cleanup flaw was found in the Linux kernel\u2019s Xen networking XDP (eXpress Data Path) subsystem. This flaw allows a local user to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Keeping this flaw Moderate, because only a denial of service is possible (A:H) as result of memory leak problem. The memory leak can happen because instead of removing skb, keeping it in the networking stack forever. The CVSS score is higher, than usually for Moderate, because kept \"C:H\" and \"I:H\" too in case maybe potentially would be possible privilege escalation too.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-33743"
        },
        {
          "category": "external",
          "summary": "RHBZ#2107924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-33743",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7\u0026id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/net/xen-netfront.c?h=v5.19-rc7\u0026id=f63c2c2032c2e3caad9add3b82cc6e91c376fd26"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/07/05/5",
          "url": "https://www.openwall.com/lists/oss-security/2022/07/05/5"
        }
      ],
      "release_date": "2022-07-04T09:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)"
    },
    {
      "cve": "CVE-2022-36280",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-09-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133450"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write vulnerability was found in the Linux kernel\u0027s vmwgfx driver in vmw_kms_cursor_snoop due to a missing check of a memcpy length. This flaw allows a local, unprivileged attacker with access to either the /dev/dri/card0 or /dev/dri/rendererD128 and able to issue an ioctl() on the resulting file descriptor, to crash the system, causing a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Systems making use of the vmwgfx driver are potentially affected by this flaw; systems without the vmwgfx driver loaded are not affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36280"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133450",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133450"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36280",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280"
        }
      ],
      "release_date": "2022-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the vmwgfx kernel module. For instructions relating to blacklisting a kernel module, please see https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop"
    },
    {
      "cve": "CVE-2022-36879",
      "cwe": {
        "id": "CWE-911",
        "name": "Improper Update of Reference Count"
      },
      "discovery_date": "2022-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2119855"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "RHBZ#2119855",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119855"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36879",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879"
        }
      ],
      "release_date": "2022-06-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice"
    },
    {
      "cve": "CVE-2022-39188",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2130141"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in include/asm-generic/tlb.h in the Linux kernel due to a race condition (unmap_mapping_range versus munmap). This issue allows a device driver to free a page while it still has stale TLB entries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only occurs in situations with VM_PFNMAP virtual memory areas (VMAs).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "RHBZ#2130141",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130141"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39188",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329",
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2329"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u",
          "url": "https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u"
        }
      ],
      "release_date": "2022-07-06T16:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry"
    },
    {
      "cve": "CVE-2022-39189",
      "cwe": {
        "id": "CWE-368",
        "name": "Context Switching Race Condition"
      },
      "discovery_date": "2022-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2124788"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "With the current usecase, attacker need a root privileges to exploit this flaw, however there may have ways to defeat this either, but in both cases it seems that Attack Complexity is high (AC:H)",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "RHBZ#2124788",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124788"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39189",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309",
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2309"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736"
        }
      ],
      "release_date": "2022-05-30T03:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning"
    },
    {
      "cve": "CVE-2022-41674",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow flaw was found in the u8 overflow in cfg80211_update_notlisted_nontrans() in net/wireless/scan.c in the Linux kernel\u2019s wifi subcomponent. This flaw allows an attacker to crash the system or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41674",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()"
    },
    {
      "cve": "CVE-2022-42703",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133483"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c functionality in the is_mergeable_anon_vma() function continuously forks, using memory operations to trigger an incorrect reuse of leaf anon_vma. This issue allows a local attacker to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free related to leaf anon_vma double reuse",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133483",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133483"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42703",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2555283eb40df89945557273121e9393ef9b542b"
        }
      ],
      "release_date": "2022-10-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free related to leaf anon_vma double reuse"
    },
    {
      "cve": "CVE-2022-42720",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134451"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in bss_ref_get in the net/wireless/scan.c in\u00a0the Linux kernel. This issue can lead to a denial of service or arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134451",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134451"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria, comprised of ease of use and deployment, applicability to widespread installation base, and stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in bss_ref_get in net/wireless/scan.c"
    },
    {
      "cve": "CVE-2022-42721",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134506"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A list corruption flaw was found in cfg80211_add_nontrans_list in the net/wireless/scan.c function in the Linux kernel. This flaw could lead to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134506",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134506"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42721",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c"
    },
    {
      "cve": "CVE-2022-42722",
      "cwe": {
        "id": "CWE-705",
        "name": "Incorrect Control Flow Scoping"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134517"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in P2P-Device in wifi in ieee80211_rx_h_decrypt in net/mac80211/rx.c in the Linux kernel, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial of service in beacon protection for P2P-device",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134517",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134517"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42722",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/10/13/2"
        }
      ],
      "release_date": "2022-10-13T10:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module mac80211 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial of service in beacon protection for P2P-device"
    },
    {
      "cve": "CVE-2022-42896",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-11-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2147364"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_connect and l2cap_le_connect_req functions. An attacker with physical access within the range of standard Bluetooth transmission could execute code leaking kernel memory via Bluetooth if within proximity of the victim.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "RHBZ#2147364",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147364"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42896",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4"
        }
      ],
      "release_date": "2022-11-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by disabling Bluetooth on the operating system level. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. For instructions on how to disable Bluetooth on RHEL please refer to https://access.redhat.com/solutions/2682931.\n\nAlternatively Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c"
    },
    {
      "cve": "CVE-2022-43750",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151270"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write flaw in the Linux kernel\u2019s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory corruption in usbmon driver",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151270"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-43750",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198",
          "url": "https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198"
        }
      ],
      "release_date": "2022-09-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory corruption in usbmon driver"
    },
    {
      "cve": "CVE-2022-47929",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2168246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux kernel. This issue may allow a local unprivileged user to trigger a denial of service if the alloc_workqueue function return is not validated in time of failure, resulting in a system crash or leaked internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in traffic control subsystem",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "RHBZ#2168246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-47929",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407"
        }
      ],
      "release_date": "2023-01-09T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in traffic control subsystem"
    },
    {
      "cve": "CVE-2022-48695",
      "discovery_date": "2024-05-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2278999"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A user after-free vulnerability was found in the Linux kernel in the refcount_t variable when performing the controller reset. This issue could lead to denial of service of the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: mpt3sas: Fix use-after-free warning",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "RHBZ#2278999",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278999"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2024050348-CVE-2022-48695-8a9e@gregkh/T"
        }
      ],
      "release_date": "2024-05-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: mpt3sas: Fix use-after-free warning"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kyle Zeng"
          ]
        }
      ],
      "cve": "CVE-2023-0394",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2162120"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: NULL pointer dereference in rawv6_push_pending_frames",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "RHBZ#2162120",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162120"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0394",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/01/18/2",
          "url": "https://www.openwall.com/lists/oss-security/2023/01/18/2"
        }
      ],
      "release_date": "2023-01-17T17:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: NULL pointer dereference in rawv6_push_pending_frames"
    },
    {
      "cve": "CVE-2023-0461",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176192"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/ulp: use-after-free in listening ULP sockets",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176192",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c",
          "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c"
        }
      ],
      "release_date": "2023-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: net/ulp: use-after-free in listening ULP sockets"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jann Horn"
          ],
          "organization": "Google Project Zero"
        }
      ],
      "cve": "CVE-2023-0590",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-01-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165741"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free due to race condition in qdisc_graft()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0590"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165741",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165741"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0590",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/",
          "url": "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/"
        }
      ],
      "release_date": "2022-10-18T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free due to race condition in qdisc_graft()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Pumpkin (@u1f383)"
          ],
          "organization": "DEVCORE Internship Program, and NYCU Software Security LAB"
        }
      ],
      "cve": "CVE-2023-1195",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2154171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "RHBZ#2154171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1195",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621",
          "url": "https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621"
        }
      ],
      "release_date": "2022-10-02T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wei Chen"
          ]
        }
      ],
      "cve": "CVE-2023-1382",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-03-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2177371"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: denial of service in tipc_conn_close",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1382"
        },
        {
          "category": "external",
          "summary": "RHBZ#2177371",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177371"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1382",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u",
          "url": "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"
        }
      ],
      "release_date": "2022-11-18T06:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "This flaw can be mitigated by preventing the affected transparent inter-process communication (TIPC) protocol kernel module from loading during the boot time. Ensure the module is added into the blacklist file.\n~~~\nRefer:  \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: denial of service in tipc_conn_close"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Wei Chen"
          ]
        }
      ],
      "cve": "CVE-2023-2177",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2023-04-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187953"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187953",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187953"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2177",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0"
        }
      ],
      "release_date": "2022-07-25T12:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common"
    },
    {
      "cve": "CVE-2023-2513",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-05-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2193097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw allows a privileged local user to cause a system crash or other undefined behaviors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ext4: use-after-free in ext4_xattr_set_entry()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw has been rated as having Moderate impact because of the preconditions needed to trigger the issue. The vulnerability can be exploited by a regular user, but the filesystem should be mounted with `debug_want_extra_isize`=128 and the user must have write access to the filesystem. It\u0027s also important to emphasize that `debug_want_extra_isize` is a debug mount option and should never be used in production.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-2513"
        },
        {
          "category": "external",
          "summary": "RHBZ#2193097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2193097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-2513",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513"
        }
      ],
      "release_date": "2022-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ext4: use-after-free in ext4_xattr_set_entry()"
    },
    {
      "cve": "CVE-2023-22998",
      "cwe": {
        "id": "CWE-436",
        "name": "Interpretation Conflict"
      },
      "discovery_date": "2023-03-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2182429"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as they did not include the `virtio_gpu_object_shmem_init` function, introduced upstream in commit 2f2aa13 (\"drm/virtio: move virtio_gpu_mem_entry initialization to new function\").",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "RHBZ#2182429",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182429"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-22998",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998"
        }
      ],
      "release_date": "2023-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init()"
    },
    {
      "cve": "CVE-2023-52340",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-01-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2257979"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw in the routing table size was found in the ICMPv6 handling of \"Packet Too Big\". The size of the routing table is regulated by periodic garbage collection. However, with \"Packet Too Big Messages\" it is possible to exceed the routing table size and garbage collector threshold. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
          "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
          "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-52340"
        },
        {
          "category": "external",
          "summary": "RHBZ#2257979",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257979"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52340",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340"
        },
        {
          "category": "external",
          "summary": "https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html",
          "url": "https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"
        }
      ],
      "release_date": "2024-01-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:01:50+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2148"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "NFV-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "NFV-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.src",
            "RT-9.2.0.GA:kernel-rt-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debug-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-devel-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-kvm-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-core-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64",
            "RT-9.2.0.GA:kernel-rt-modules-extra-0:5.14.0-284.11.1.rt14.296.el9_2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ICMPv6 \u201cPacket Too Big\u201d packets force a DoS of the Linux kernel by forcing 100% CPU"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…