[RHSA-2021:4356] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)
* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)
* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)
* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)
* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)
* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)
* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)
* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)
* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)
* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)
* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)
* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)
* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)
* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)
* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)
* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)
* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)
* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)
* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)
* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)
* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)
* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)
* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)
* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)
* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)
* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)
* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)
* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)
* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)
* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)
* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)
* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)
* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)
* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)
* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)
* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)
* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)
* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
- ID
- RHSA-2021:4356
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2021:4356
- Published
-
2021-11-09T00:00:00
(2 years ago) - Modified
-
2021-11-09T00:00:00
(2 years ago) - Rights
- Copyright 2021 Red Hat, Inc.
- Other Advisories
-
- ALAS-2021-1461
- ALAS-2021-1477
- ALAS-2021-1480
- ALAS-2021-1503
- ALAS-2021-1516
- ALAS-2021-1539
- ALAS2-2020-1566
- ALAS2-2021-1588
- ALAS2-2021-1600
- ALAS2-2021-1636
- ALAS2-2021-1675
- ALAS2-2021-1685
- ALAS2-2021-1704
- ALSA-2021:4356
- ASB-A-174738029
- ASB-A-175451844
- CISCO-SA-WIFI-FAF-22EPCEWU
- DSA-4843-1
- DSA-4951-1
- DSA-4978-1
- DSA-5096-1
- ELSA-2020-5569
- ELSA-2021-0856
- ELSA-2021-2725
- ELSA-2021-3327
- ELSA-2021-4356
- ELSA-2021-9030
- ELSA-2021-9035
- ELSA-2021-9037
- ELSA-2021-9038
- ELSA-2021-9039
- ELSA-2021-9040
- ELSA-2021-9041
- ELSA-2021-9043
- ELSA-2021-9084
- ELSA-2021-9085
- ELSA-2021-9086
- ELSA-2021-9087
- ELSA-2021-9215
- ELSA-2021-9220
- ELSA-2021-9221
- ELSA-2021-9222
- ELSA-2021-9223
- ELSA-2021-9305
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9308
- ELSA-2021-9346
- ELSA-2021-9349
- ELSA-2021-9351
- ELSA-2021-9362
- ELSA-2021-9363
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9450
- ELSA-2021-9451
- ELSA-2021-9452
- ELSA-2021-9453
- ELSA-2021-9458
- ELSA-2021-9459
- ELSA-2021-9460
- ELSA-2021-9470
- ELSA-2021-9471
- ELSA-2021-9485
- ELSA-2021-9488
- ELSA-2021-9534
- ELSA-2021-9577
- ELSA-2022-0620
- ELSA-2022-9088
- ELSA-2022-9348
- ELSA-2022-9365
- ELSA-2022-9368
- ELSA-2024-12110
- FEDORA-2020-b732958765
- FEDORA-2020-bc0cc81a7a
- FEDORA-2021-05152dbcf5
- FEDORA-2021-0b35886add
- FEDORA-2021-2306e89112
- FEDORA-2021-286375de1e
- FEDORA-2021-3465ada1ca
- FEDORA-2021-41fb54ae9f
- FEDORA-2021-5ad5249c43
- FEDORA-2021-646098b5b8
- FEDORA-2021-68b0dd2373
- FEDORA-2021-6b0f287b8b
- FEDORA-2021-76aaa904e2
- FEDORA-2021-7c085ca697
- FEDORA-2021-8cd093f639
- FEDORA-2021-9503fffad9
- FEDORA-2021-9c0276e935
- FEDORA-2021-a963f04012
- FEDORA-2021-bc2a819bc5
- FEDORA-2021-db2bb87f35
- FEDORA-2021-e49da8a226
- FEDORA-2021-e636ce53df
- FEDORA-2021-e6b4847979
- FEDORA-2021-f0181b8085
- FEDORA-2021-f8ede2fdfc
- FREEBSD:8D20BD48-A4F3-11EC-90DE-1C697AA5A594
- FREEBSD:D2C2C815-3793-11EA-8BE3-54E1AD3D6335
- GLSA-202209-16
- MS:CVE-2020-24587
- MS:CVE-2020-24588
- MS:CVE-2020-26144
- MS:CVE-2020-27777
- MS:CVE-2020-29368
- MS:CVE-2020-29660
- MS:CVE-2020-36158
- MS:CVE-2021-20194
- MS:CVE-2021-23133
- MS:CVE-2021-28950
- MS:CVE-2021-28971
- MS:CVE-2021-29155
- MS:CVE-2021-29646
- MS:CVE-2021-29650
- MS:CVE-2021-31829
- MS:CVE-2021-31916
- MS:CVE-2021-33033
- MS:CVE-2021-33200
- MS:CVE-2021-3348
- MS:CVE-2021-3564
- MS:CVE-2021-3659
- MS:CVE-2021-3732
- openSUSE-SU-2020:0336-1
- openSUSE-SU-2020:1586-1
- openSUSE-SU-2020:1655-1
- openSUSE-SU-2020:2161-1
- openSUSE-SU-2020:2193-1
- openSUSE-SU-2020:2260-1
- openSUSE-SU-2021:0060-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0241-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:0393-1
- openSUSE-SU-2021:0532-1
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0716-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0873-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1142-1
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2184-1
- openSUSE-SU-2021:2202-1
- openSUSE-SU-2021:2291-1
- openSUSE-SU-2021:2305-1
- openSUSE-SU-2021:2352-1
- openSUSE-SU-2021:2427-1
- openSUSE-SU-2021:2645-1
- openSUSE-SU-2021:2687-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2021:3941-1
- openSUSE-SU-2022:0056-1
- openSUSE-SU-2022:0131-1
- openSUSE-SU-2022:0366-1
- RHSA-2021:0856
- RHSA-2021:0857
- RHSA-2021:2725
- RHSA-2021:2726
- RHSA-2021:3327
- RHSA-2021:3328
- RHSA-2021:4140
- RHSA-2022:0620
- RHSA-2022:0622
- RLSA-2021:4356
- SSA:2020-086-01
- SSA:2021-202-01
- SSA:2022-031-01
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0558-1
- SUSE-SU-2020:0559-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0580-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0599-1
- SUSE-SU-2020:0605-1
- SUSE-SU-2020:0613-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:2879-1
- SUSE-SU-2020:2904-1
- SUSE-SU-2020:2905-1
- SUSE-SU-2020:2906-1
- SUSE-SU-2020:2907-1
- SUSE-SU-2020:2908-1
- SUSE-SU-2020:2999-1
- SUSE-SU-2020:3014-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2020:3713-1
- SUSE-SU-2020:3714-1
- SUSE-SU-2020:3715-1
- SUSE-SU-2020:3717-1
- SUSE-SU-2020:3718-1
- SUSE-SU-2020:3748-1
- SUSE-SU-2020:3764-1
- SUSE-SU-2020:3766-1
- SUSE-SU-2020:3798-1
- SUSE-SU-2021:0094-1
- SUSE-SU-2021:0095-1
- SUSE-SU-2021:0096-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0108-1
- SUSE-SU-2021:0117-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0347-1
- SUSE-SU-2021:0348-1
- SUSE-SU-2021:0354-1
- SUSE-SU-2021:0359-1
- SUSE-SU-2021:0362-1
- SUSE-SU-2021:0367-1
- SUSE-SU-2021:0377-1
- SUSE-SU-2021:0386-1
- SUSE-SU-2021:0408-1
- SUSE-SU-2021:0427-1
- SUSE-SU-2021:0433-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:0532-1
- SUSE-SU-2021:0735-1
- SUSE-SU-2021:0736-1
- SUSE-SU-2021:0737-1
- SUSE-SU-2021:0738-1
- SUSE-SU-2021:0739-1
- SUSE-SU-2021:0740-1
- SUSE-SU-2021:0741-1
- SUSE-SU-2021:0742-1
- SUSE-SU-2021:0808-1
- SUSE-SU-2021:0809-1
- SUSE-SU-2021:0818-1
- SUSE-SU-2021:0823-1
- SUSE-SU-2021:0826-1
- SUSE-SU-2021:0840-1
- SUSE-SU-2021:0841-1
- SUSE-SU-2021:0842-1
- SUSE-SU-2021:0849-1
- SUSE-SU-2021:0853-1
- SUSE-SU-2021:0859-1
- SUSE-SU-2021:0864-1
- SUSE-SU-2021:0868-1
- SUSE-SU-2021:0869-1
- SUSE-SU-2021:1046-1
- SUSE-SU-2021:1175-1
- SUSE-SU-2021:1176-1
- SUSE-SU-2021:1177-1
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1571-1
- SUSE-SU-2021:1572-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1574-1
- SUSE-SU-2021:1595-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1605-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1622-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1915-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2184-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2202-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2291-1
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2305-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2332-1
- SUSE-SU-2021:2344-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2352-1
- SUSE-SU-2021:2361-1
- SUSE-SU-2021:2366-1
- SUSE-SU-2021:2367-1
- SUSE-SU-2021:2377-1
- SUSE-SU-2021:2384-1
- SUSE-SU-2021:2387-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:2453-1
- SUSE-SU-2021:2460-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2643-1
- SUSE-SU-2021:2644-1
- SUSE-SU-2021:2645-1
- SUSE-SU-2021:2646-1
- SUSE-SU-2021:2647-1
- SUSE-SU-2021:2678-1
- SUSE-SU-2021:2687-1
- SUSE-SU-2021:2756-1
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3360-1
- SUSE-SU-2021:3361-1
- SUSE-SU-2021:3371-1
- SUSE-SU-2021:3374-1
- SUSE-SU-2021:3401-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3440-1
- SUSE-SU-2021:3443-1
- SUSE-SU-2021:3459-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3877-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3941-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2021:3979-1
- SUSE-SU-2021:3992-1
- SUSE-SU-2022:0056-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0079-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0131-1
- SUSE-SU-2022:0181-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:2719-1
- SUSE-SU-2022:2720-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2827-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3687-1
- SUSE-SU-2022:3691-1
- SUSE-SU-2023:0394-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2948-1
- USN-4253-1
- USN-4253-2
- USN-4254-1
- USN-4254-2
- USN-4255-1
- USN-4255-2
- USN-4284-1
- USN-4285-1
- USN-4286-1
- USN-4286-2
- USN-4287-1
- USN-4287-2
- USN-4657-1
- USN-4679-1
- USN-4680-1
- USN-4708-1
- USN-4748-1
- USN-4749-1
- USN-4750-1
- USN-4751-1
- USN-4752-1
- USN-4876-1
- USN-4877-1
- USN-4878-1
- USN-4879-1
- USN-4884-1
- USN-4907-1
- USN-4909-1
- USN-4910-1
- USN-4911-1
- USN-4912-1
- USN-4945-1
- USN-4945-2
- USN-4946-1
- USN-4947-1
- USN-4948-1
- USN-4949-1
- USN-4950-1
- USN-4977-1
- USN-4979-1
- USN-4982-1
- USN-4983-1
- USN-4984-1
- USN-4997-1
- USN-4997-2
- USN-4999-1
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5003-1
- USN-5015-1
- USN-5017-1
- USN-5018-1
- USN-5044-1
- USN-5045-1
- USN-5046-1
- USN-5050-1
- USN-5091-1
- USN-5091-2
- USN-5092-1
- USN-5092-2
- USN-5094-1
- USN-5094-2
- USN-5096-1
- USN-5113-1
- USN-5115-1
- USN-5116-1
- USN-5116-2
- USN-5130-1
- USN-5299-1
- USN-5343-1
- USN-5361-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python3-perf?arch=x86_64&distro=redhat-8 | redhat | python3-perf | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/python3-perf?arch=s390x&distro=redhat-8 | redhat | python3-perf | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/python3-perf?arch=ppc64le&distro=redhat-8 | redhat | python3-perf | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/python3-perf?arch=aarch64&distro=redhat-8 | redhat | python3-perf | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-8 | redhat | perf | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-8 | redhat | perf | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-8 | redhat | perf | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=aarch64&distro=redhat-8 | redhat | perf | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=aarch64&distro=redhat-8 | redhat | kernel | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-zfcpdump?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-modules | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules-extra?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-modules-extra | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-devel?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-devel | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-core?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-core | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=s390x&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=aarch64&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-8 | redhat | kernel-tools-libs | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-8 | redhat | kernel-tools-libs | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=aarch64&distro=redhat-8 | redhat | kernel-tools-libs | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-8 | redhat | kernel-tools-libs-devel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-8 | redhat | kernel-tools-libs-devel | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=aarch64&distro=redhat-8 | redhat | kernel-tools-libs-devel | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=x86_64&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=s390x&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules?arch=ppc64le&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules?arch=aarch64&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=x86_64&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=s390x&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=ppc64le&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=aarch64&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=aarch64&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-8 | redhat | kernel-doc | < 4.18.0-348.el8 | redhat-8 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=aarch64&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=aarch64&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=s390x&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=s390x&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=s390x&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=x86_64&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=s390x&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=ppc64le&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=aarch64&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=x86_64&distro=redhat-8 | redhat | kernel-core | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=s390x&distro=redhat-8 | redhat | kernel-core | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-core?arch=ppc64le&distro=redhat-8 | redhat | kernel-core | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-core?arch=aarch64&distro=redhat-8 | redhat | kernel-core | < 4.18.0-348.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-abi-stablelists?distro=redhat-8 | redhat | kernel-abi-stablelists | < 4.18.0-348.el8 | redhat-8 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-8 | redhat | bpftool | < 4.18.0-348.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-8 | redhat | bpftool | < 4.18.0-348.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-8 | redhat | bpftool | < 4.18.0-348.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=aarch64&distro=redhat-8 | redhat | bpftool | < 4.18.0-348.el8 | redhat-8 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |