[RHSA-2022:1988] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)
kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)
kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
kernel: information leak in the IPv6 implementation (CVE-2021-45485)
kernel: information leak in the IPv4 implementation (CVE-2021-45486)
hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
- ID
- RHSA-2022:1988
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:1988
- Published
-
2022-05-10T00:00:00
(2 years ago) - Modified
-
2022-05-10T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2021-1503
- ALAS-2022-1563
- ALAS-2022-1571
- ALAS-2022-1591
- ALAS-2023-1688
- ALAS-2023-1706
- ALAS2-2021-1627
- ALAS2-2021-1719
- ALAS2-2021-1727
- ALAS2-2022-1749
- ALAS2-2022-1761
- ALAS2-2022-1793
- ALAS2-2023-1932
- ALAS2-2024-2569
- ALSA-2022:1988
- ASA-202107-48
- ASA-202107-49
- ASA-202107-50
- ASA-202107-51
- ASB-A-111893654
- ASB-A-216408350
- DSA-4978-1
- DSA-5092-1
- DSA-5095-1
- DSA-5096-1
- DSA-5127-1
- DSA-5173-1
- DSA-5257-1
- ELSA-2021-3327
- ELSA-2021-9222
- ELSA-2021-9223
- ELSA-2021-9305
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9308
- ELSA-2021-9452
- ELSA-2021-9453
- ELSA-2021-9474
- ELSA-2021-9475
- ELSA-2021-9564
- ELSA-2021-9565
- ELSA-2021-9621
- ELSA-2021-9623
- ELSA-2022-0063
- ELSA-2022-0620
- ELSA-2022-1198
- ELSA-2022-1988
- ELSA-2022-9088
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9260
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9348
- ELSA-2022-9479
- ELSA-2022-9480
- ELSA-2022-9761
- ELSA-2022-9828
- ELSA-2022-9829
- ELSA-2022-9852
- ELSA-2022-9969
- ELSA-2023-0187
- ELSA-2023-0399
- ELSA-2023-12232
- ELSA-2023-12255
- ELSA-2023-12256
- FEDORA-2020-4700a73bd5
- FEDORA-2020-8c15928d23
- FEDORA-2021-19ad835cb3
- FEDORA-2021-4320606094
- FEDORA-2021-4fed2b55c4
- FEDORA-2021-79cbbefebe
- FEDORA-2021-7de33b7016
- FEDORA-2021-8364530ebf
- FEDORA-2021-9dd76a1ed0
- FEDORA-2021-a093973910
- FEDORA-2021-a95108d156
- FEDORA-2021-c09b851eb0
- FEDORA-2021-e71c033f88
- FEDORA-2021-eab8c5a263
- FEDORA-2021-ed8c2e1098
- FEDORA-2021-fdef34e26f
- FEDORA-2021-ffda3d6fa1
- FEDORA-2022-9342e59a98
- FEDORA-2022-a23dd56848
- FEDORA-2022-ade480f201
- FEDORA-2022-b7ef5c55da
- FEDORA-2022-d918ad60e5
- FEDORA-2022-de4474b89d
- MS:CVE-2020-13974
- MS:CVE-2021-29154
- MS:CVE-2021-3669
- MS:CVE-2021-37159
- MS:CVE-2021-3743
- MS:CVE-2021-3744
- MS:CVE-2021-3764
- MS:CVE-2021-3772
- MS:CVE-2021-4002
- MS:CVE-2021-4037
- MS:CVE-2021-4083
- MS:CVE-2021-4157
- MS:CVE-2021-41864
- MS:CVE-2021-4197
- MS:CVE-2021-4203
- MS:CVE-2021-42739
- MS:CVE-2021-43389
- MS:CVE-2021-43976
- MS:CVE-2021-44733
- MS:CVE-2021-45485
- MS:CVE-2021-45486
- MS:CVE-2022-0322
- MS:CVE-2022-0850
- MS:CVE-2022-1011
- MS:CVE-2022-3105
- MS:CVE-2022-3106
- MS:CVE-2022-3108
- MS:CVE-2023-0459
- openSUSE-SU-2020:0935-1
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2020:1586-1
- openSUSE-SU-2020:1655-1
- openSUSE-SU-2020:2161-1
- openSUSE-SU-2020:2193-1
- openSUSE-SU-2020:2260-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0242-1
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:1076-1
- openSUSE-SU-2021:1142-1
- openSUSE-SU-2021:1271-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1501-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:2645-1
- openSUSE-SU-2021:2687-1
- openSUSE-SU-2021:3179-1
- openSUSE-SU-2021:3205-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3806-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2021:3941-1
- openSUSE-SU-2022:0056-1
- openSUSE-SU-2022:0131-1
- openSUSE-SU-2022:0169-1
- openSUSE-SU-2022:0198-1
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- openSUSE-SU-2022:0755-1
- openSUSE-SU-2022:0760-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:0940-1
- openSUSE-SU-2022:2549-1
- RHSA-2021:3327
- RHSA-2021:3328
- RHSA-2022:0063
- RHSA-2022:0065
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2022:1185
- RHSA-2022:1198
- RHSA-2022:1199
- RHSA-2022:1975
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:0399
- RHSA-2023:0400
- RLSA-2022:1988
- SSA:2021-202-01
- SSA:2022-031-01
- SSA:2022-129-01
- SSA:2023-172-02
- SUSE-SU-2020:1693-1
- SUSE-SU-2020:1699-1
- SUSE-SU-2020:2027-1
- SUSE-SU-2020:2103-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2106-1
- SUSE-SU-2020:2107-1
- SUSE-SU-2020:2121-1
- SUSE-SU-2020:2134-1
- SUSE-SU-2020:2152-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2879-1
- SUSE-SU-2020:2904-1
- SUSE-SU-2020:2905-1
- SUSE-SU-2020:2906-1
- SUSE-SU-2020:2907-1
- SUSE-SU-2020:2908-1
- SUSE-SU-2020:2999-1
- SUSE-SU-2020:3014-1
- SUSE-SU-2020:3501-1
- SUSE-SU-2020:3503-1
- SUSE-SU-2020:3532-1
- SUSE-SU-2020:3544-1
- SUSE-SU-2020:3713-1
- SUSE-SU-2020:3748-1
- SUSE-SU-2020:3764-1
- SUSE-SU-2020:3766-1
- SUSE-SU-2020:3798-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1248-1
- SUSE-SU-2021:1266-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1715-1
- SUSE-SU-2021:1724-1
- SUSE-SU-2021:1728-1
- SUSE-SU-2021:1865-1
- SUSE-SU-2021:1870-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2198-1
- SUSE-SU-2021:2407-1
- SUSE-SU-2021:2408-1
- SUSE-SU-2021:2416-1
- SUSE-SU-2021:2438-1
- SUSE-SU-2021:2577-1
- SUSE-SU-2021:2599-1
- SUSE-SU-2021:2599-2
- SUSE-SU-2021:2643-1
- SUSE-SU-2021:2645-1
- SUSE-SU-2021:2646-1
- SUSE-SU-2021:2678-1
- SUSE-SU-2021:2687-1
- SUSE-SU-2021:2756-1
- SUSE-SU-2021:3177-1
- SUSE-SU-2021:3178-1
- SUSE-SU-2021:3179-1
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3205-1
- SUSE-SU-2021:3205-2
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3207-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3684-1
- SUSE-SU-2021:3692-1
- SUSE-SU-2021:3710-1
- SUSE-SU-2021:3712-1
- SUSE-SU-2021:3718-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3735-1
- SUSE-SU-2021:3737-1
- SUSE-SU-2021:3738-1
- SUSE-SU-2021:3742-1
- SUSE-SU-2021:3743-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3751-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3806-1
- SUSE-SU-2021:3807-1
- SUSE-SU-2021:3848-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3877-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3933-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3941-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2021:3978-1
- SUSE-SU-2021:3979-1
- SUSE-SU-2021:3992-1
- SUSE-SU-2021:4021-1
- SUSE-SU-2021:4038-1
- SUSE-SU-2021:4057-1
- SUSE-SU-2021:4075-1
- SUSE-SU-2021:4090-1
- SUSE-SU-2021:4099-1
- SUSE-SU-2022:0056-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0079-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0131-1
- SUSE-SU-2022:0169-1
- SUSE-SU-2022:0181-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0198-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0237-1
- SUSE-SU-2022:0238-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0242-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0246-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0267-1
- SUSE-SU-2022:0270-1
- SUSE-SU-2022:0288-1
- SUSE-SU-2022:0289-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0298-1
- SUSE-SU-2022:0325-1
- SUSE-SU-2022:0327-1
- SUSE-SU-2022:0328-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0364-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0372-1
- SUSE-SU-2022:0418-1
- SUSE-SU-2022:0436-1
- SUSE-SU-2022:0463-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0552-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0755-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0760-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0763-1
- SUSE-SU-2022:0764-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:0931-1
- SUSE-SU-2022:0939-1
- SUSE-SU-2022:0940-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1270-1
- SUSE-SU-2022:1283-1
- SUSE-SU-2022:1285-1
- SUSE-SU-2022:1300-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1322-1
- SUSE-SU-2022:1326-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1335-1
- SUSE-SU-2022:1359-1
- SUSE-SU-2022:1369-1
- SUSE-SU-2022:1375-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:1408-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1453-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1598-1
- SUSE-SU-2022:1611-1
- SUSE-SU-2022:1634-1
- SUSE-SU-2022:1641-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0134-1
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0146-1
- SUSE-SU-2023:0147-1
- SUSE-SU-2023:0148-1
- SUSE-SU-2023:0149-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2384-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2895-1
- USN-4427-1
- USN-4439-1
- USN-4440-1
- USN-4483-1
- USN-4485-1
- USN-4657-1
- USN-4658-1
- USN-4659-1
- USN-4660-1
- USN-4681-1
- USN-4912-1
- USN-4916-1
- USN-4917-1
- USN-5070-1
- USN-5071-1
- USN-5071-2
- USN-5071-3
- USN-5073-1
- USN-5073-2
- USN-5073-3
- USN-5092-1
- USN-5092-2
- USN-5096-1
- USN-5106-1
- USN-5113-1
- USN-5115-1
- USN-5117-1
- USN-5120-1
- USN-5135-1
- USN-5136-1
- USN-5137-1
- USN-5137-2
- USN-5139-1
- USN-5140-1
- USN-5161-1
- USN-5162-1
- USN-5163-1
- USN-5164-1
- USN-5165-1
- USN-5206-1
- USN-5207-1
- USN-5208-1
- USN-5209-1
- USN-5210-1
- USN-5211-1
- USN-5218-1
- USN-5265-1
- USN-5266-1
- USN-5267-1
- USN-5267-3
- USN-5268-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5299-1
- USN-5302-1
- USN-5317-1
- USN-5318-1
- USN-5319-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5361-1
- USN-5362-1
- USN-5368-1
- USN-5377-1
- USN-5381-1
- USN-5383-1
- USN-5413-1
- USN-5415-1
- USN-5417-1
- USN-5418-1
- USN-5466-1
- USN-5467-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5515-1
- USN-5541-1
- USN-5650-1
- USN-5924-1
- USN-5927-1
- USN-5975-1
- USN-5980-1
- USN-5981-1
- USN-5984-1
- USN-5985-1
- USN-5991-1
- USN-6001-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6020-1
- USN-6027-1
- USN-6030-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6093-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6151-1
- USN-6174-1
- USN-6222-1
- USN-6235-1
- USN-6256-1
- USN-6971-1
- VU:155143
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python3-perf?arch=x86_64&distro=redhat-8 | redhat | python3-perf | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/python3-perf?arch=s390x&distro=redhat-8 | redhat | python3-perf | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/python3-perf?arch=ppc64le&distro=redhat-8 | redhat | python3-perf | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/python3-perf?arch=aarch64&distro=redhat-8 | redhat | python3-perf | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-8 | redhat | perf | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-8 | redhat | perf | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-8 | redhat | perf | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=aarch64&distro=redhat-8 | redhat | perf | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8 | redhat | kernel | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-8 | redhat | kernel | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8 | redhat | kernel | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=aarch64&distro=redhat-8 | redhat | kernel | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-zfcpdump?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-modules | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules-extra?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-devel?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-devel | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-core?arch=s390x&distro=redhat-8 | redhat | kernel-zfcpdump-core | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=s390x&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=aarch64&distro=redhat-8 | redhat | kernel-tools | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-8 | redhat | kernel-tools-libs | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-8 | redhat | kernel-tools-libs | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=aarch64&distro=redhat-8 | redhat | kernel-tools-libs | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-8 | redhat | kernel-tools-libs-devel | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-8 | redhat | kernel-tools-libs-devel | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=aarch64&distro=redhat-8 | redhat | kernel-tools-libs-devel | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=x86_64&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=s390x&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules?arch=ppc64le&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules?arch=aarch64&distro=redhat-8 | redhat | kernel-modules | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=x86_64&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=s390x&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=ppc64le&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=aarch64&distro=redhat-8 | redhat | kernel-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=aarch64&distro=redhat-8 | redhat | kernel-headers | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-8 | redhat | kernel-doc | < 4.18.0-372.9.1.el8 | redhat-8 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=aarch64&distro=redhat-8 | redhat | kernel-devel | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=aarch64&distro=redhat-8 | redhat | kernel-debug | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=s390x&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-modules | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=s390x&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-modules-extra | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-devel | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=x86_64&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=s390x&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=ppc64le&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=aarch64&distro=redhat-8 | redhat | kernel-debug-core | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=x86_64&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=s390x&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=ppc64le&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=aarch64&distro=redhat-8 | redhat | kernel-cross-headers | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=x86_64&distro=redhat-8 | redhat | kernel-core | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=s390x&distro=redhat-8 | redhat | kernel-core | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/kernel-core?arch=ppc64le&distro=redhat-8 | redhat | kernel-core | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-core?arch=aarch64&distro=redhat-8 | redhat | kernel-core | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-abi-stablelists?distro=redhat-8 | redhat | kernel-abi-stablelists | < 4.18.0-372.9.1.el8 | redhat-8 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-8 | redhat | bpftool | < 4.18.0-372.9.1.el8 | redhat-8 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-8 | redhat | bpftool | < 4.18.0-372.9.1.el8 | redhat-8 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-8 | redhat | bpftool | < 4.18.0-372.9.1.el8 | redhat-8 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=aarch64&distro=redhat-8 | redhat | bpftool | < 4.18.0-372.9.1.el8 | redhat-8 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |