[RHSA-2023:7077] kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)
kernel: net/sched: multiple vulnerabilities (CVE-2023-3609, CVE-2023-3611, CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208)
kernel: out-of-bounds write in qfq_change_class function (CVE-2023-31436)
kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait (CVE-2021-43975)
kernel: Rate limit overflow messages in r8152 in intr_callback (CVE-2022-3594)
kernel: use after free flaw in l2cap_conn_del (CVE-2022-3640)
kernel: double free in usb_8dev_start_xmit (CVE-2022-28388)
kernel: vmwgfx: multiple vulnerabilities (CVE-2022-38457, CVE-2022-40133, CVE-2023-33951, CVE-2023-33952)
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)
kernel: Information leak in l2cap_parse_conf_req (CVE-2022-42895)
kernel: KVM: multiple vulnerabilities (CVE-2022-45869, CVE-2023-4155, CVE-2023-30456)
kernel: memory leak in ttusb_dec_exit_dvb (CVE-2022-45887)
kernel: speculative pointer dereference in do_prlimit (CVE-2023-0458)
kernel: use-after-free due to race condition in qdisc_graft (CVE-2023-0590)
kernel: x86/mm: Randomize per-cpu entry area (CVE-2023-0597)
kernel: HID: check empty report_list in hid_validate_values (CVE-2023-1073)
kernel: sctp: fail if no bound addresses can be used for a given scope (CVE-2023-1074)
kernel: hid: Use After Free in asus_remove (CVE-2023-1079)
kernel: use-after-free in drivers/media/rc/ene_ir.c (CVE-2023-1118)
kernel: hash collisions in the IPv6 connection lookup table (CVE-2023-1206)
kernel: ovl: fix use after free in struct ovl_aio_req (CVE-2023-1252)
kernel: denial of service in tipc_conn_close (CVE-2023-1382)
kernel: Use after free bug in btsdio_remove due to race condition (CVE-2023-1989)
kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)
kernel: ext4: use-after-free in ext4_xattr_set_entry (CVE-2023-2513)
kernel: fbcon: shift-out-of-bounds in fbcon_set_font (CVE-2023-3161)
kernel: out-of-bounds access in relay_file_read (CVE-2023-3268)
kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params (CVE-2023-3772)
kernel: smsusb: use-after-free caused by do_submit_urb (CVE-2023-4132)
kernel: Race between task migrating pages and another task calling exit_mmap (CVE-2023-4732)
Kernel: denial of service in atm_tc_enqueue due to type confusion (CVE-2023-23455)
kernel: mpls: double free on sysctl allocation failure (CVE-2023-26545)
kernel: Denial of service issue in az6027 driver (CVE-2023-28328)
kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow (CVE-2023-28772)
kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible (CVE-2023-31084)
kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove (CVE-2023-33203)
kernel: saa7134: race condition leading to use-after-free in saa7134_finidev (CVE-2023-35823)
kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c (CVE-2023-35824)
kernel: r592: race condition leading to use-after-free in r592_remove (CVE-2023-35825)
kernel: net/tls: tls_is_tx_ready() checked list_entry (CVE-2023-1075)
kernel: use-after-free bug in remove function xgene_hwmon_remove (CVE-2023-1855)
kernel: Use after free bug in r592_remove (CVE-2023-3141)
kernel: gfs2: NULL pointer dereference in gfs2_evict_inode (CVE-2023-3212)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.
- ID
- RHSA-2023:7077
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:7077
- Published
-
2023-11-14T00:00:00
(10 months ago) - Modified
-
2023-11-14T00:00:00
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1645
- ALAS-2023-1701
- ALAS-2023-1706
- ALAS-2023-1735
- ALAS-2023-1744
- ALAS-2023-1776
- ALAS-2023-1792
- ALAS-2023-1803
- ALAS-2023-1827
- ALAS-2023-1838
- ALAS-2024-1899
- ALAS-2024-1942
- ALAS2-2021-1696
- ALAS2-2022-1876
- ALAS2-2022-1888
- ALAS2-2023-1932
- ALAS2-2023-1987
- ALAS2-2023-2027
- ALAS2-2023-2035
- ALAS2-2023-2100
- ALAS2-2023-2108
- ALAS2-2023-2179
- ALAS2-2023-2195
- ALAS2-2023-2206
- ALAS2-2023-2264
- ALAS2-2023-2268
- ALAS2-2024-2391
- ALAS2-2024-2448
- ALAS2-2024-2581
- ALPINE:CVE-2022-40982
- ALSA-2023:1470
- ALSA-2023:2458
- ALSA-2023:4377
- ALSA-2023:7077
- ALSA-2024:0897
- DSA-5096-1
- DSA-5127-1
- DSA-5173-1
- DSA-5324-1
- DSA-5402-1
- DSA-5448-1
- DSA-5474-1
- DSA-5475-1
- DSA-5480-1
- DSA-5492-1
- ELSA-2022-10108
- ELSA-2022-9533
- ELSA-2022-9534
- ELSA-2022-9557
- ELSA-2023-12008
- ELSA-2023-12009
- ELSA-2023-12017
- ELSA-2023-12018
- ELSA-2023-12109
- ELSA-2023-12116
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12120
- ELSA-2023-12160
- ELSA-2023-12196
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12232
- ELSA-2023-12323
- ELSA-2023-12339
- ELSA-2023-12375
- ELSA-2023-12394
- ELSA-2023-12412
- ELSA-2023-12413
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-12688
- ELSA-2023-12722
- ELSA-2023-12723
- ELSA-2023-12724
- ELSA-2023-12782
- ELSA-2023-12785
- ELSA-2023-12786
- ELSA-2023-12788
- ELSA-2023-12842
- ELSA-2023-12970
- ELSA-2023-12974
- ELSA-2023-13001
- ELSA-2023-13005
- ELSA-2023-13019
- ELSA-2023-1470
- ELSA-2023-2458
- ELSA-2023-4377
- ELSA-2023-5622
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7423
- ELSA-2024-0897
- ELSA-2024-12150
- ELSA-2024-12169
- ELSA-2024-12354
- ELSA-2024-1831
- FEDORA-2021-c09b851eb0
- FEDORA-2021-eab8c5a263
- FEDORA-2022-5cd9d787dc
- FEDORA-2022-64ab9153c0
- FEDORA-2022-65a0a3504a
- FEDORA-2022-7aadaadebc
- FEDORA-2022-91633399ff
- FEDORA-2022-af492757d9
- FEDORA-2023-04473fc41e
- FEDORA-2023-10d34be85a
- FEDORA-2023-4006357f7e
- FEDORA-2023-4426b7005f
- FEDORA-2023-75b22000cd
- FEDORA-2023-c9ab30c8e3
- FEDORA-2023-d9509be489
- FEDORA-2023-e1482687dd
- FEDORA-2023-ee241dcf80
- FEDORA-2023-fff31650c8
- MS:CVE-2021-43975
- MS:CVE-2022-28388
- MS:CVE-2022-3594
- MS:CVE-2022-45869
- MS:CVE-2023-0458
- MS:CVE-2023-1079
- MS:CVE-2023-1118
- MS:CVE-2023-23455
- MS:CVE-2023-2513
- MS:CVE-2023-26545
- MS:CVE-2023-31436
- MS:CVE-2023-3212
- MS:CVE-2023-3609
- MS:CVE-2023-3611
- MS:CVE-2023-4128
- MS:CVE-2023-4132
- MS:CVE-2023-4206
- MS:CVE-2023-4207
- MS:CVE-2023-4208
- openSUSE-SU-2022:0056-1
- openSUSE-SU-2022:0131-1
- openSUSE-SU-2022:0366-1
- RHSA-2023:1469
- RHSA-2023:1470
- RHSA-2023:1471
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:4377
- RHSA-2023:4378
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2023:6901
- RHSA-2023:7419
- RHSA-2023:7423
- RHSA-2023:7424
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1323
- RLSA-2023:1470
- SSA:2022-129-01
- SSA:2022-333-01
- SSA:2023-048-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2022:0056-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0079-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0131-1
- SUSE-SU-2022:0181-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:3897-1
- SUSE-SU-2022:3929-1
- SUSE-SU-2022:3930-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4053-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4272-1
- SUSE-SU-2022:4273-1
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0591-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0762-1
- SUSE-SU-2023:0767-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0770-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0778-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:0780-1
- SUSE-SU-2023:0796-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1574-1
- SUSE-SU-2023:1576-1
- SUSE-SU-2023:1579-1
- SUSE-SU-2023:1588-1
- SUSE-SU-2023:1591-1
- SUSE-SU-2023:1592-1
- SUSE-SU-2023:1595-1
- SUSE-SU-2023:1599-1
- SUSE-SU-2023:1602-1
- SUSE-SU-2023:1605-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1619-1
- SUSE-SU-2023:1621-1
- SUSE-SU-2023:1635-1
- SUSE-SU-2023:1639-1
- SUSE-SU-2023:1640-1
- SUSE-SU-2023:1647-1
- SUSE-SU-2023:1649-1
- SUSE-SU-2023:1651-1
- SUSE-SU-2023:1653-1
- SUSE-SU-2023:1654-1
- SUSE-SU-2023:1708-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1971-1
- SUSE-SU-2023:1972-1
- SUSE-SU-2023:1973-1
- SUSE-SU-2023:1975-1
- SUSE-SU-2023:1977-1
- SUSE-SU-2023:1981-1
- SUSE-SU-2023:1982-1
- SUSE-SU-2023:1983-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:1995-1
- SUSE-SU-2023:2007-1
- SUSE-SU-2023:2009-1
- SUSE-SU-2023:2023-1
- SUSE-SU-2023:2024-1
- SUSE-SU-2023:2031-1
- SUSE-SU-2023:2035-1
- SUSE-SU-2023:2043-1
- SUSE-SU-2023:2055-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2369-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2376-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2386-1
- SUSE-SU-2023:2389-1
- SUSE-SU-2023:2395-1
- SUSE-SU-2023:2399-1
- SUSE-SU-2023:2401-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2415-1
- SUSE-SU-2023:2416-1
- SUSE-SU-2023:2420-1
- SUSE-SU-2023:2422-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2442-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2453-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2459-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2660-1
- SUSE-SU-2023:2666-1
- SUSE-SU-2023:2679-1
- SUSE-SU-2023:2680-1
- SUSE-SU-2023:2681-1
- SUSE-SU-2023:2686-1
- SUSE-SU-2023:2687-1
- SUSE-SU-2023:2689-1
- SUSE-SU-2023:2690-1
- SUSE-SU-2023:2694-1
- SUSE-SU-2023:2695-1
- SUSE-SU-2023:2697-1
- SUSE-SU-2023:2698-1
- SUSE-SU-2023:2700-1
- SUSE-SU-2023:2701-1
- SUSE-SU-2023:2702-1
- SUSE-SU-2023:2703-1
- SUSE-SU-2023:2708-1
- SUSE-SU-2023:2709-1
- SUSE-SU-2023:2710-1
- SUSE-SU-2023:2714-1
- SUSE-SU-2023:2718-1
- SUSE-SU-2023:2719-1
- SUSE-SU-2023:2720-1
- SUSE-SU-2023:2721-1
- SUSE-SU-2023:2724-1
- SUSE-SU-2023:2727-1
- SUSE-SU-2023:2731-1
- SUSE-SU-2023:2734-1
- SUSE-SU-2023:2735-1
- SUSE-SU-2023:2741-1
- SUSE-SU-2023:2743-1
- SUSE-SU-2023:2755-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2803-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:2892-1
- SUSE-SU-2023:3116-1
- SUSE-SU-2023:3153-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3289-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3359-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3382-1
- SUSE-SU-2023:3383-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3600-1
- SUSE-SU-2023:3600-2
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3680-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3682-1
- SUSE-SU-2023:3683-1
- SUSE-SU-2023:3684-1
- SUSE-SU-2023:3687-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3773-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3784-1
- SUSE-SU-2023:3785-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- SUSE-SU-2023:3922-1
- SUSE-SU-2023:3923-1
- SUSE-SU-2023:3924-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2023:3964-1
- SUSE-SU-2023:3969-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:3190-1
- SUSE-SU-2024:3209-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5297-1
- USN-5337-1
- USN-5368-1
- USN-5385-1
- USN-5416-1
- USN-5469-1
- USN-5493-1
- USN-5493-2
- USN-5505-1
- USN-5513-1
- USN-5539-1
- USN-5541-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5780-1
- USN-5789-1
- USN-5850-1
- USN-5851-1
- USN-5853-1
- USN-5858-1
- USN-5859-1
- USN-5860-1
- USN-5874-1
- USN-5875-1
- USN-5876-1
- USN-5877-1
- USN-5878-1
- USN-5879-1
- USN-5883-1
- USN-5884-1
- USN-5909-1
- USN-5911-1
- USN-5912-1
- USN-5915-1
- USN-5917-1
- USN-5918-1
- USN-5919-1
- USN-5920-1
- USN-5924-1
- USN-5925-1
- USN-5926-1
- USN-5927-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-5975-1
- USN-5978-1
- USN-5981-1
- USN-5982-1
- USN-5984-1
- USN-5987-1
- USN-5991-1
- USN-6000-1
- USN-6001-1
- USN-6004-1
- USN-6007-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6024-1
- USN-6025-1
- USN-6027-1
- USN-6029-1
- USN-6030-1
- USN-6031-1
- USN-6032-1
- USN-6033-1
- USN-6040-1
- USN-6057-1
- USN-6071-1
- USN-6072-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6093-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6123-1
- USN-6124-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6171-1
- USN-6172-1
- USN-6173-1
- USN-6174-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6206-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6231-1
- USN-6235-1
- USN-6252-1
- USN-6254-1
- USN-6256-1
- USN-6260-1
- USN-6283-1
- USN-6284-1
- USN-6285-1
- USN-6286-1
- USN-6300-1
- USN-6301-1
- USN-6309-1
- USN-6311-1
- USN-6312-1
- USN-6314-1
- USN-6315-1
- USN-6316-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6327-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6337-1
- USN-6338-1
- USN-6338-2
- USN-6339-1
- USN-6339-2
- USN-6339-3
- USN-6339-4
- USN-6340-1
- USN-6340-2
- USN-6341-1
- USN-6342-1
- USN-6342-2
- USN-6343-1
- USN-6344-1
- USN-6346-1
- USN-6347-1
- USN-6348-1
- USN-6349-1
- USN-6350-1
- USN-6351-1
- USN-6357-1
- USN-6383-1
- USN-6385-1
- USN-6386-1
- USN-6386-2
- USN-6386-3
- USN-6387-1
- USN-6387-2
- USN-6388-1
- USN-6396-1
- USN-6396-2
- USN-6396-3
- USN-6397-1
- USN-6412-1
- USN-6415-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6417-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6445-1
- USN-6445-2
- USN-6460-1
- USN-6462-1
- USN-6462-2
- USN-6464-1
- USN-6465-1
- USN-6465-2
- USN-6465-3
- USN-6466-1
- USN-6516-1
- USN-6520-1
- USN-6604-1
- USN-6604-2
- USN-6699-1
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6739-1
- USN-6740-1
- XSA-435
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python3-perf?arch=x86_64&distro=redhat-8.9 | redhat | python3-perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/python3-perf?arch=s390x&distro=redhat-8.9 | redhat | python3-perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/python3-perf?arch=ppc64le&distro=redhat-8.9 | redhat | python3-perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/python3-perf?arch=aarch64&distro=redhat-8.9 | redhat | python3-perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-8.9 | redhat | perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-8.9 | redhat | perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64le&distro=redhat-8.9 | redhat | perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/perf?arch=aarch64&distro=redhat-8.9 | redhat | perf | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel?arch=aarch64&distro=redhat-8.9 | redhat | kernel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-zfcpdump?arch=s390x&distro=redhat-8.9 | redhat | kernel-zfcpdump | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules?arch=s390x&distro=redhat-8.9 | redhat | kernel-zfcpdump-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-modules-extra?arch=s390x&distro=redhat-8.9 | redhat | kernel-zfcpdump-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-devel?arch=s390x&distro=redhat-8.9 | redhat | kernel-zfcpdump-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-zfcpdump-core?arch=s390x&distro=redhat-8.9 | redhat | kernel-zfcpdump-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=x86_64&distro=redhat-8.9 | redhat | kernel-tools | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools?arch=s390x&distro=redhat-8.9 | redhat | kernel-tools | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-tools?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-tools | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools?arch=aarch64&distro=redhat-8.9 | redhat | kernel-tools | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=x86_64&distro=redhat-8.9 | redhat | kernel-tools-libs | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-tools-libs | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs?arch=aarch64&distro=redhat-8.9 | redhat | kernel-tools-libs | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=x86_64&distro=redhat-8.9 | redhat | kernel-tools-libs-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-tools-libs-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-tools-libs-devel?arch=aarch64&distro=redhat-8.9 | redhat | kernel-tools-libs-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=x86_64&distro=redhat-8.9 | redhat | kernel-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules?arch=s390x&distro=redhat-8.9 | redhat | kernel-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules?arch=aarch64&distro=redhat-8.9 | redhat | kernel-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=x86_64&distro=redhat-8.9 | redhat | kernel-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=s390x&distro=redhat-8.9 | redhat | kernel-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-modules-extra?arch=aarch64&distro=redhat-8.9 | redhat | kernel-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-8.9 | redhat | kernel-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-8.9 | redhat | kernel-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-headers?arch=aarch64&distro=redhat-8.9 | redhat | kernel-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-8.9 | redhat | kernel-doc | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-8.9 | redhat | kernel-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-8.9 | redhat | kernel-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-devel?arch=aarch64&distro=redhat-8.9 | redhat | kernel-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-8.9 | redhat | kernel-debug | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-8.9 | redhat | kernel-debug | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-debug | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug?arch=aarch64&distro=redhat-8.9 | redhat | kernel-debug | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=x86_64&distro=redhat-8.9 | redhat | kernel-debug-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=s390x&distro=redhat-8.9 | redhat | kernel-debug-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-debug-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules?arch=aarch64&distro=redhat-8.9 | redhat | kernel-debug-modules | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=x86_64&distro=redhat-8.9 | redhat | kernel-debug-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=s390x&distro=redhat-8.9 | redhat | kernel-debug-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-debug-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-modules-extra?arch=aarch64&distro=redhat-8.9 | redhat | kernel-debug-modules-extra | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-8.9 | redhat | kernel-debug-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-8.9 | redhat | kernel-debug-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-debug-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=aarch64&distro=redhat-8.9 | redhat | kernel-debug-devel | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=x86_64&distro=redhat-8.9 | redhat | kernel-debug-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=s390x&distro=redhat-8.9 | redhat | kernel-debug-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-debug-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-debug-core?arch=aarch64&distro=redhat-8.9 | redhat | kernel-debug-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=x86_64&distro=redhat-8.9 | redhat | kernel-cross-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=s390x&distro=redhat-8.9 | redhat | kernel-cross-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-cross-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-cross-headers?arch=aarch64&distro=redhat-8.9 | redhat | kernel-cross-headers | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=x86_64&distro=redhat-8.9 | redhat | kernel-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-core?arch=s390x&distro=redhat-8.9 | redhat | kernel-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/kernel-core?arch=ppc64le&distro=redhat-8.9 | redhat | kernel-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/kernel-core?arch=aarch64&distro=redhat-8.9 | redhat | kernel-core | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 | |
Affected | pkg:rpm/redhat/kernel-abi-stablelists?distro=redhat-8.9 | redhat | kernel-abi-stablelists | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ||
Affected | pkg:rpm/redhat/bpftool?arch=x86_64&distro=redhat-8.9 | redhat | bpftool | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | x86_64 | |
Affected | pkg:rpm/redhat/bpftool?arch=s390x&distro=redhat-8.9 | redhat | bpftool | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | s390x | |
Affected | pkg:rpm/redhat/bpftool?arch=ppc64le&distro=redhat-8.9 | redhat | bpftool | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | ppc64le | |
Affected | pkg:rpm/redhat/bpftool?arch=aarch64&distro=redhat-8.9 | redhat | bpftool | < 4.18.0-513.5.1.el8_9 | redhat-8.9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |