[RHSA-2023:2458] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)
KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)
race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
memory leak in ipv6_renew_options() (CVE-2022-3524)
data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
data races around sk->sk_prot (CVE-2022-3567)
memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)
l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
lockdown bypass using IMA (CVE-2022-21505)
double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)
unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
Denial of service in beacon protection for P2P-device (CVE-2022-42722)
memory corruption in usbmon driver (CVE-2022-43750)
NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)
use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
denial of service in tipc_conn_close (CVE-2023-1382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
- ID
- RHSA-2023:2458
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:2458
- Published
-
2023-05-09T00:00:00
(16 months ago) - Modified
-
2023-05-09T00:00:00
(16 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1571
- ALAS-2022-1636
- ALAS-2022-1645
- ALAS-2023-1706
- ALAS-2023-1707
- ALAS-2023-1744
- ALAS-2024-1899
- ALAS2-2021-1712
- ALAS2-2022-1761
- ALAS2-2022-1833
- ALAS2-2022-1852
- ALAS2-2022-1876
- ALAS2-2022-1903
- ALAS2-2023-1932
- ALAS2-2023-2035
- ALAS2-2024-2391
- ALPINE:CVE-2022-33743
- ALPINE:CVE-2022-41674
- ALPINE:CVE-2022-42720
- ALPINE:CVE-2022-42721
- ALPINE:CVE-2022-42722
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:4517
- ALSA-2023:7077
- ASA-202210-1
- ASA-202210-2
- ASA-202210-3
- ASA-202210-4
- DSA-5127-1
- DSA-5161-1
- DSA-5173-1
- DSA-5191-1
- DSA-5207-1
- DSA-5257-1
- DSA-5324-1
- DSA-5480-1
- ELSA-2022-10065
- ELSA-2022-10108
- ELSA-2022-9198
- ELSA-2022-9199
- ELSA-2022-9200
- ELSA-2022-9201
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9533
- ELSA-2022-9534
- ELSA-2022-9557
- ELSA-2022-9601
- ELSA-2022-9602
- ELSA-2022-9609
- ELSA-2022-9612
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9761
- ELSA-2022-9852
- ELSA-2022-9870
- ELSA-2022-9871
- ELSA-2022-9926
- ELSA-2022-9927
- ELSA-2022-9930
- ELSA-2022-9931
- ELSA-2022-9998
- ELSA-2022-9999
- ELSA-2023-1091
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12119
- ELSA-2023-12121
- ELSA-2023-12196
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12226
- ELSA-2023-12232
- ELSA-2023-12255
- ELSA-2023-12256
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-12588
- ELSA-2023-12590
- ELSA-2023-12591
- ELSA-2023-12842
- ELSA-2023-1987
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-4517
- ELSA-2023-7077
- ELSA-2024-12150
- ELSA-2024-1249
- ELSA-2024-12610
- ELSA-2024-12612
- FEDORA-2022-1a5b125ac6
- FEDORA-2022-24041b1667
- FEDORA-2022-2cfbe17910
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-3b86247c11
- FEDORA-2022-5cd9d787dc
- FEDORA-2022-64ab9153c0
- FEDORA-2022-65a0a3504a
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-7aadaadebc
- FEDORA-2022-91633399ff
- FEDORA-2022-af492757d9
- FEDORA-2022-b36cd53dca
- FEDORA-2022-b948fc3cfb
- FEDORA-2022-be819b07a3
- FEDORA-2022-ccb0138bb6
- FEDORA-2022-e4460c41bc
- FEDORA-2022-ef8c8a5925
- FEDORA-2023-3fd7349f60
- FEDORA-2023-f4f9182dc8
- MS:CVE-2021-33655
- MS:CVE-2022-1882
- MS:CVE-2022-28388
- MS:CVE-2022-3028
- MS:CVE-2022-33743
- MS:CVE-2022-36879
- MS:CVE-2022-3707
- MS:CVE-2022-39188
- MS:CVE-2022-39189
- MS:CVE-2022-41674
- MS:CVE-2022-42703
- MS:CVE-2022-42720
- MS:CVE-2022-42721
- MS:CVE-2022-42722
- MS:CVE-2022-43750
- MS:CVE-2022-4662
- MS:CVE-2022-47929
- MS:CVE-2023-0394
- MS:CVE-2023-0461
- MS:CVE-2023-22998
- MS:CVE-2023-2513
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2023:1091
- RHSA-2023:1092
- RHSA-2023:1987
- RHSA-2023:1988
- RHSA-2023:2148
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- RLSA-2023:4517
- SSA:2022-129-01
- SSA:2022-237-02
- SSA:2022-333-01
- SSA:2023-048-01
- SSA:2023-172-02
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2696-1
- SUSE-SU-2022:2697-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2710-1
- SUSE-SU-2022:2719-1
- SUSE-SU-2022:2720-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2722-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2732-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2750-1
- SUSE-SU-2022:2759-1
- SUSE-SU-2022:2762-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2779-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2781-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2803-1
- SUSE-SU-2022:2808-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2827-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3263-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3342-1
- SUSE-SU-2022:3346-1
- SUSE-SU-2022:3350-1
- SUSE-SU-2022:3359-1
- SUSE-SU-2022:3360-1
- SUSE-SU-2022:3362-1
- SUSE-SU-2022:3366-1
- SUSE-SU-2022:3368-1
- SUSE-SU-2022:3369-1
- SUSE-SU-2022:3370-1
- SUSE-SU-2022:3372-1
- SUSE-SU-2022:3373-1
- SUSE-SU-2022:3377-1
- SUSE-SU-2022:3379-1
- SUSE-SU-2022:3406-1
- SUSE-SU-2022:3407-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3409-1
- SUSE-SU-2022:3412-1
- SUSE-SU-2022:3415-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3424-1
- SUSE-SU-2022:3432-1
- SUSE-SU-2022:3433-1
- SUSE-SU-2022:3445-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3463-1
- SUSE-SU-2022:3464-1
- SUSE-SU-2022:3465-1
- SUSE-SU-2022:3476-1
- SUSE-SU-2022:3584-1
- SUSE-SU-2022:3585-1
- SUSE-SU-2022:3586-1
- SUSE-SU-2022:3587-1
- SUSE-SU-2022:3601-1
- SUSE-SU-2022:3605-1
- SUSE-SU-2022:3606-1
- SUSE-SU-2022:3607-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3628-1
- SUSE-SU-2022:3648-1
- SUSE-SU-2022:3657-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3844-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3976-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4037-1
- SUSE-SU-2022:4038-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0134-1
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0146-1
- SUSE-SU-2023:0147-1
- SUSE-SU-2023:0148-1
- SUSE-SU-2023:0149-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0394-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0762-1
- SUSE-SU-2023:0767-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0770-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0778-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:0780-1
- SUSE-SU-2023:0796-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1971-1
- SUSE-SU-2023:1973-1
- SUSE-SU-2023:1975-1
- SUSE-SU-2023:1982-1
- SUSE-SU-2023:1983-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:1995-1
- SUSE-SU-2023:2007-1
- SUSE-SU-2023:2009-1
- SUSE-SU-2023:2023-1
- SUSE-SU-2023:2024-1
- SUSE-SU-2023:2031-1
- SUSE-SU-2023:2035-1
- SUSE-SU-2023:2043-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2416-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1097-1
- USN-5416-1
- USN-5469-1
- USN-5493-1
- USN-5493-2
- USN-5505-1
- USN-5513-1
- USN-5514-1
- USN-5518-1
- USN-5529-1
- USN-5539-1
- USN-5540-1
- USN-5541-1
- USN-5564-1
- USN-5577-1
- USN-5580-1
- USN-5596-1
- USN-5621-1
- USN-5622-1
- USN-5623-1
- USN-5624-1
- USN-5630-1
- USN-5633-1
- USN-5635-1
- USN-5639-1
- USN-5640-1
- USN-5644-1
- USN-5647-1
- USN-5648-1
- USN-5650-1
- USN-5652-1
- USN-5654-1
- USN-5655-1
- USN-5660-1
- USN-5667-1
- USN-5668-1
- USN-5677-1
- USN-5682-1
- USN-5683-1
- USN-5691-1
- USN-5692-1
- USN-5693-1
- USN-5700-1
- USN-5703-1
- USN-5706-1
- USN-5708-1
- USN-5727-1
- USN-5727-2
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5729-1
- USN-5729-2
- USN-5752-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5780-1
- USN-5783-1
- USN-5789-1
- USN-5790-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5793-1
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5794-1
- USN-5802-1
- USN-5803-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5809-1
- USN-5813-1
- USN-5814-1
- USN-5815-1
- USN-5829-1
- USN-5830-1
- USN-5831-1
- USN-5832-1
- USN-5850-1
- USN-5851-1
- USN-5853-1
- USN-5854-1
- USN-5860-1
- USN-5861-1
- USN-5862-1
- USN-5863-1
- USN-5865-1
- USN-5874-1
- USN-5875-1
- USN-5876-1
- USN-5877-1
- USN-5878-1
- USN-5879-1
- USN-5883-1
- USN-5909-1
- USN-5911-1
- USN-5912-1
- USN-5913-1
- USN-5914-1
- USN-5915-1
- USN-5916-1
- USN-5917-1
- USN-5918-1
- USN-5919-1
- USN-5920-1
- USN-5924-1
- USN-5925-1
- USN-5927-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-5970-1
- USN-5975-1
- USN-5976-1
- USN-5977-1
- USN-5978-1
- USN-5979-1
- USN-5980-1
- USN-5981-1
- USN-5982-1
- USN-5984-1
- USN-5985-1
- USN-5987-1
- USN-5991-1
- USN-6000-1
- USN-6001-1
- USN-6004-1
- USN-6007-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6020-1
- USN-6024-1
- USN-6025-1
- USN-6027-1
- USN-6030-1
- USN-6031-1
- USN-6032-1
- USN-6040-1
- USN-6057-1
- USN-6071-1
- USN-6079-1
- USN-6080-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6093-1
- USN-6094-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6151-1
- USN-6222-1
- USN-6247-1
- USN-6248-1
- USN-6254-1
- USN-6256-1
- USN-6284-1
- USN-6301-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6337-1
- USN-6739-1
- USN-6740-1
- XSA-405
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/rtla?arch=x86_64&distro=redhat-9.2 | redhat | rtla | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/rtla?arch=s390x&distro=redhat-9.2 | redhat | rtla | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/rtla?arch=ppc64le&distro=redhat-9.2 | redhat | rtla | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/rtla?arch=aarch64&distro=redhat-9.2 | redhat | rtla | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/python3-perf?arch=x86_64&distro=redhat-9.2 | redhat | python3-perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/python3-perf?arch=s390x&distro=redhat-9.2 | redhat | python3-perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/python3-perf?arch=ppc64le&distro=redhat-9.2 | redhat | python3-perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/python3-perf?arch=aarch64&distro=redhat-9.2 | redhat | python3-perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-9.2 | redhat | perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-9.2 | redhat | perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-9.2 | redhat | perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=aarch64&distro=redhat-9.2 | redhat | perf | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-9.2 | redhat | kernel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-9.2 | redhat | kernel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-9.2 | redhat | kernel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=aarch64&distro=redhat-9.2 | redhat | kernel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-zfcpdump?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules-extra?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules-core?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-devel?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-devel-matched?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-core?arch=s390x&distro=redhat-9.2 | redhat | kernel-zfcpdump-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-uki-virt?arch=x86_64&distro=redhat-9.2 | redhat | kernel-uki-virt | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-9.2 | redhat | kernel-tools | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=s390x&distro=redhat-9.2 | redhat | kernel-tools | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-tools | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=aarch64&distro=redhat-9.2 | redhat | kernel-tools | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-9.2 | redhat | kernel-tools-libs | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-tools-libs | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=aarch64&distro=redhat-9.2 | redhat | kernel-tools-libs | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-tools-libs-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-tools-libs-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=aarch64&distro=redhat-9.2 | redhat | kernel-tools-libs-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=x86_64&distro=redhat-9.2 | redhat | kernel-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=s390x&distro=redhat-9.2 | redhat | kernel-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules?arch=aarch64&distro=redhat-9.2 | redhat | kernel-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=x86_64&distro=redhat-9.2 | redhat | kernel-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=s390x&distro=redhat-9.2 | redhat | kernel-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=aarch64&distro=redhat-9.2 | redhat | kernel-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules-core?arch=s390x&distro=redhat-9.2 | redhat | kernel-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules-core?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-9.2 | redhat | kernel-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-9.2 | redhat | kernel-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=aarch64&distro=redhat-9.2 | redhat | kernel-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-9.2 | redhat | kernel-doc | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-9.2 | redhat | kernel-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=aarch64&distro=redhat-9.2 | redhat | kernel-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-devel-matched?arch=x86_64&distro=redhat-9.2 | redhat | kernel-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel-matched?arch=s390x&distro=redhat-9.2 | redhat | kernel-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel-matched?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel-matched?arch=aarch64&distro=redhat-9.2 | redhat | kernel-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-uki-virt?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-uki-virt | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-core?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules-core?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel-matched?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel-matched?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel-matched?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel-matched?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-debug-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=s390x&distro=redhat-9.2 | redhat | kernel-debug-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-debug-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-debug-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=x86_64&distro=redhat-9.2 | redhat | kernel-cross-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=s390x&distro=redhat-9.2 | redhat | kernel-cross-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-cross-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=aarch64&distro=redhat-9.2 | redhat | kernel-cross-headers | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=x86_64&distro=redhat-9.2 | redhat | kernel-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=s390x&distro=redhat-9.2 | redhat | kernel-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/kernel-core?arch=ppc64le&distro=redhat-9.2 | redhat | kernel-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-abi-stablelists?distro=redhat-9.2 | redhat | kernel-abi-stablelists | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | ||
Affected | pkg:rpm/redhat/kernel-64k?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-modules?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-modules-extra?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-modules-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-devel?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-devel-matched?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug-modules?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug-modules | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug-modules-extra?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug-modules-extra | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug-modules-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug-modules-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug-devel?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug-devel | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug-devel-matched?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug-devel-matched | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-debug-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-debug-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-64k-core?arch=aarch64&distro=redhat-9.2 | redhat | kernel-64k-core | < 5.14.0-284.11.1.el9_2 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-9.2 | redhat | bpftool | < 7.0.0-284.11.1.el9_2 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-9.2 | redhat | bpftool | < 7.0.0-284.11.1.el9_2 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-9.2 | redhat | bpftool | < 7.0.0-284.11.1.el9_2 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=aarch64&distro=redhat-9.2 | redhat | bpftool | < 7.0.0-284.11.1.el9_2 | redhat-9.2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |