[RHSA-2022:7110] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
Information leak in scsi_ioctl() (CVE-2022-0494)
A kernel-info-leak issue in pfkey_register (CVE-2022-1353)
RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
Branch Type Confusion (non-retbleed) (CVE-2022-23825)
RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
Add s390_iommu_aperture kernel parameter (BZ#2081324)
Blackscreen and hangup after resume from hibernate or S3 with DFGX WX3200 (BZ#2091065)
Update NVME subsystem with bug fixes and minor changes (BZ#2106017)
Fix parsing of nw_proto for IPv6 fragments (BZ#2106703)
"vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107488)
'disable_policy' is ignored for addresses configured on a down interface (BZ#2109971)
Backport request for new cpufreq.default_governor kernel command line parameter (BZ#2109996)
Panics in mpt3sas mpt3sas_halt_firmware() if mpt3sas_fwfault_debug=1 enabled when poweroff issued to server (BZ#2111140)
IOMMU/DMA update for 8.7 (BZ#2111692)
Update Broadcom Emulex lpfc driver for RHEL8.7 with bug fixes (14.0.0.13) (BZ#2112103)
Incorrect Socket(s) & "Core(s) per socket" reported by lscpu command. (BZ#2112820)
Panic in ch_release() due to NULL ch->device pointer, backport upstream fix (BZ#2115965)
pyverbs-tests fail over qede IW HCAs on "test_query_rc_qp" (tests.test_qp.QPTest) (BZ#2119122)
qedi shutdown handler hangs upon reboot (BZ#2119847)
cache link_info for ethtool (BZ#2120197)
Important iavf bug fixes (BZ#2120225)
Hibernate crash with Aquantia 2.5/5 Gb LAN card (BZ#2124966)
While using PTimekeeper the qede driver produces excessive log messages (BZ#2125477)
general protection fault handling rpc_xprt.timer (BZ#2126184)
Not enough device MSI-X vectors (BZ#2126482)
Atlantic driver panic on wakeup after hybernate (BZ#2127845)
Memory leak in vxlan_xmit_one (BZ#2131255)
Missing hybernate/resume fixes (BZ#2131936)
Enhancement(s):
Update smartpqi driver to latest upstream Second Set of Patches (BZ#2112354)
qed/qede/qedr - driver updates to latest upstream (BZ#2120611)
Update qedi driver to latest upstream (BZ#2120612)
Update qedf driver to latest upstream (BZ#2120613)
Include the support for new NVIDIA Mobile GFX GA103 on ADL Gen Laptops (BZ#2127122)
Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129923)
- ID
- RHSA-2022:7110
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:7110
- Published
-
2022-10-25T00:00:00
(23 months ago) - Modified
-
2022-10-25T00:00:00
(23 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1591
- ALAS-2022-1604
- ALAS-2022-1636
- ALAS2-2022-1793
- ALAS2-2022-1813
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2024-2569
- ALPINE:CVE-2022-23816
- ALPINE:CVE-2022-23825
- ALPINE:CVE-2022-29900
- ALSA-2022:6003
- ALSA-2022:7110
- ALSA-2022:8267
- DSA-5127-1
- DSA-5161-1
- DSA-5173-1
- DSA-5184-1
- DSA-5207-1
- ELSA-2022-6003
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-8267
- ELSA-2022-9479
- ELSA-2022-9480
- ELSA-2022-9590
- ELSA-2022-9591
- ELSA-2022-9689
- ELSA-2022-9690
- ELSA-2022-9691
- ELSA-2022-9692
- ELSA-2022-9693
- ELSA-2022-9694
- ELSA-2022-9699
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9761
- ELSA-2022-9787
- ELSA-2022-9788
- ELSA-2022-9827
- ELSA-2022-9830
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12433
- FEDORA-2022-3e6ce58029
- FEDORA-2022-484e226872
- FEDORA-2022-8aab5b5cde
- FEDORA-2022-9bbb1d9b7b
- FEDORA-2022-a0d7a5eaf2
- FEDORA-2022-c69ef9c1dd
- GLSA-202402-07
- MS:CVE-2022-0494
- MS:CVE-2022-1353
- MS:CVE-2022-23825
- MS:CVE-2022-29900
- openSUSE-SU-2022:2549-1
- RHSA-2022:6002
- RHSA-2022:6003
- RHSA-2022:7134
- RHSA-2022:7137
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7344
- RHSA-2022:7933
- RHSA-2022:8267
- RLSA-2022:7110
- SSA:2022-129-01
- SSA:2022-237-02
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5381-1
- USN-5467-1
- USN-5469-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5515-1
- USN-5541-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5582-1
- USN-5588-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- VMSA-2022-0020.2
- XSA-407
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python3-perf?arch=x86_64&distro=redhat-8.6 | redhat | python3-perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/python3-perf?arch=s390x&distro=redhat-8.6 | redhat | python3-perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/python3-perf?arch=ppc64le&distro=redhat-8.6 | redhat | python3-perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/python3-perf?arch=aarch64&distro=redhat-8.6 | redhat | python3-perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-8.6 | redhat | perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-8.6 | redhat | perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-8.6 | redhat | perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=aarch64&distro=redhat-8.6 | redhat | perf | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.6 | redhat | kernel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-8.6 | redhat | kernel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.6 | redhat | kernel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=aarch64&distro=redhat-8.6 | redhat | kernel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-zfcpdump?arch=s390x&distro=redhat-8.6 | redhat | kernel-zfcpdump | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules?arch=s390x&distro=redhat-8.6 | redhat | kernel-zfcpdump-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules-extra?arch=s390x&distro=redhat-8.6 | redhat | kernel-zfcpdump-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-devel?arch=s390x&distro=redhat-8.6 | redhat | kernel-zfcpdump-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-core?arch=s390x&distro=redhat-8.6 | redhat | kernel-zfcpdump-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-8.6 | redhat | kernel-tools | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=s390x&distro=redhat-8.6 | redhat | kernel-tools | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-tools | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=aarch64&distro=redhat-8.6 | redhat | kernel-tools | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-8.6 | redhat | kernel-tools-libs | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-tools-libs | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=aarch64&distro=redhat-8.6 | redhat | kernel-tools-libs | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-8.6 | redhat | kernel-tools-libs-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-tools-libs-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=aarch64&distro=redhat-8.6 | redhat | kernel-tools-libs-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=x86_64&distro=redhat-8.6 | redhat | kernel-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=s390x&distro=redhat-8.6 | redhat | kernel-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules?arch=aarch64&distro=redhat-8.6 | redhat | kernel-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=x86_64&distro=redhat-8.6 | redhat | kernel-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=s390x&distro=redhat-8.6 | redhat | kernel-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=aarch64&distro=redhat-8.6 | redhat | kernel-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-8.6 | redhat | kernel-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-8.6 | redhat | kernel-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=aarch64&distro=redhat-8.6 | redhat | kernel-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-8.6 | redhat | kernel-doc | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-8.6 | redhat | kernel-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-8.6 | redhat | kernel-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=aarch64&distro=redhat-8.6 | redhat | kernel-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-8.6 | redhat | kernel-debug | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-8.6 | redhat | kernel-debug | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-debug | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=aarch64&distro=redhat-8.6 | redhat | kernel-debug | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=x86_64&distro=redhat-8.6 | redhat | kernel-debug-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=s390x&distro=redhat-8.6 | redhat | kernel-debug-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-debug-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=aarch64&distro=redhat-8.6 | redhat | kernel-debug-modules | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=x86_64&distro=redhat-8.6 | redhat | kernel-debug-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=s390x&distro=redhat-8.6 | redhat | kernel-debug-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-debug-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=aarch64&distro=redhat-8.6 | redhat | kernel-debug-modules-extra | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-8.6 | redhat | kernel-debug-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-8.6 | redhat | kernel-debug-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-debug-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=aarch64&distro=redhat-8.6 | redhat | kernel-debug-devel | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=x86_64&distro=redhat-8.6 | redhat | kernel-debug-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=s390x&distro=redhat-8.6 | redhat | kernel-debug-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-debug-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=aarch64&distro=redhat-8.6 | redhat | kernel-debug-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=x86_64&distro=redhat-8.6 | redhat | kernel-cross-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=s390x&distro=redhat-8.6 | redhat | kernel-cross-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-cross-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=aarch64&distro=redhat-8.6 | redhat | kernel-cross-headers | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=x86_64&distro=redhat-8.6 | redhat | kernel-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=s390x&distro=redhat-8.6 | redhat | kernel-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/kernel-core?arch=ppc64le&distro=redhat-8.6 | redhat | kernel-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-core?arch=aarch64&distro=redhat-8.6 | redhat | kernel-core | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-abi-stablelists?distro=redhat-8.6 | redhat | kernel-abi-stablelists | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-8.6 | redhat | bpftool | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-8.6 | redhat | bpftool | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-8.6 | redhat | bpftool | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=aarch64&distro=redhat-8.6 | redhat | bpftool | < 4.18.0-372.32.1.el8_6 | redhat-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |