cve
stringlengths 13
16
| cwe
stringclasses 474
values | affected_component
stringlengths 0
255
| summary
stringlengths 0
246
| severity
stringclasses 5
values | cvss_v2
stringclasses 250
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 20
4k
| statement
stringlengths 31
2.49k
⌀ | discovery_date
stringlengths 25
32
⌀ | release_date
stringlengths 25
32
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
599
| known_not_affected_products
sequencelengths 0
30.2k
| under_investigation_products
sequencelengths 0
78
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
217
| remediation_details
sequencelengths 0
217
| remediation_dates
sequencelengths 0
217
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-20377 | null | CVE-2022-20377 | null | null | null | In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-35876 | null | CVE-2022-35876 | null | null | null | Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` and `key` configuration parameters, as used within the `testWifiAP` XCMD handler | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-28747 | null | CVE-2022-28747 | null | null | null | Key reuse in GoSecure Titan Inbox Detection & Response (IDR) through 2022-04-05 leads to remote code execution. To exploit this vulnerability, an attacker must craft and sign a serialized payload. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-36759 | null | CVE-2022-36759 | null | null | null | Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /dishes.php?res_id=. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-29855 | null | CVE-2022-29855 | null | null | null | Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-49254 | null | kernel | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
In cal_ctx_v4l2_init_formats(), devm_kzalloc() is assigned to
ctx->active_fmt and there is a dereference of it after that, which could
lead to NULL pointer dereference on failure of devm_kzalloc().
Fix this bug by adding a NULL check of ctx->active_fmt.
This bug was found by a static analyzer.
Builds with 'make allyesconfig' show no new warnings, and our static
analyzer no longer warns about this code. | null | 2025-02-26T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-31566 | null | CVE-2022-31566 | null | null | null | The DSAB-local/DSAB repository through 2019-02-18 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-25175 | CWE-78 | workflow-multibranch | OS command execution through crafted SCM contents | Important | null | 9.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | A flaw was found in Jenkins. The Pipeline: Multibranch uses the same checkout directories for distinct SCMs for the readTrusted step. This flaw allows attackers with item/configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.This allows attackers to compromise confidentiality, integrity, and availability. | null | 2022-02-15T00:00:00+00:00 | 2022-02-15T00:00:00+00:00 | [
"7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1650371376-1.el7.noarch",
"7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1650371376-1.el7.src",
"8Base-RHOSE-4.10:jenkins-2-plugins-0:4.10.1647505461-1.el8.noarch",
"8Base-RHOSE-4.10:jenkins-2-plugins-0:4.10.1647505461-1.el8.src",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1650364520-1.el8.noarch",
"8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1650364520-1.el8.src",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1648800585-1.el8.noarch",
"8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1648800585-1.el8.src",
"8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1646993358-1.el8.noarch",
"8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1646993358-1.el8.src",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1647580879-1.el8.noarch",
"8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1647580879-1.el8.src"
] | [] | [
"7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.685-1.g2e6be86.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.685-1.g2e6be86.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.685-1.g2e6be86.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.685-1.g2e6be86.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.685-1.g2e6be86.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.685-1.git.0.7faaeaa.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.685-1.g99b2acf.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.685-1.g99b2acf.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.685-1.g99b2acf.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.685-1.gd435537.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.685-1.gd435537.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.685-1.gd435537.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.685-1.git.0.7faaeaa.el7.noarch",
"7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.685-1.g3571208.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.685-1.g3571208.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.685-1.git.0.7faaeaa.el7.noarch",
"7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.685-1.gf8bf728.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.685-1.gf8bf728.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.685-1.gf8bf728.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.685-1.gc8f26da.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.685-1.gc8f26da.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.685-1.gc8f26da.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.685-1.g39cfc66.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.685-1.g39cfc66.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.685-1.g39cfc66.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.685-1.git.0.7faaeaa.el7.x86_64",
"7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.685-1.gd742e61.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.685-1.gd742e61.el7.src",
"7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.685-1.gd742e61.el7.x86_64",
"7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.685-1.gedebe84.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.685-1.gedebe84.el7.src",
"7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.685-1.gedebe84.el7.x86_64",
"7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.685-1.g13de638.el7.src",
"7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.685-1.g609cd20.el7.src",
"7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.685-1.g99aae51.el7.src",
"7Server-RH7-RHOSE-3.11:jenkins-0:2.319.3.1650348949-1.el7.noarch",
"7Server-RH7-RHOSE-3.11:jenkins-0:2.319.3.1650348949-1.el7.src",
"7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.685-1.git.0.a9090ac.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.685-1.git.0.a9090ac.el7.src",
"7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.685-1.git.0.a9090ac.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.685-1.git.0.a9090ac.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.685-1.git.0.a9090ac.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.685-1.git.0.a9090ac.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.685-1.gf2f435d.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.685-1.gf2f435d.el7.src",
"7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.685-1.gf2f435d.el7.x86_64",
"7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.685-1.g22be164.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.685-1.g22be164.el7.src",
"7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.685-1.g22be164.el7.x86_64",
"7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.685-1.g0c4bf66.el7.src",
"7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.685-1.g0c4bf66.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.685-1.g0c4bf66.el7.noarch",
"7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.685-1.g0c4bf66.el7.noarch",
"7Server-RH7-RHOSE-3.11:prometheus-0:3.11.685-1.g99aae51.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:prometheus-0:3.11.685-1.g99aae51.el7.x86_64",
"7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.685-1.g13de638.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.685-1.g13de638.el7.x86_64",
"7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.685-1.g609cd20.el7.ppc64le",
"7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.685-1.g609cd20.el7.x86_64",
"7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.685-1.g0c4bf66.el7.noarch",
"7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el7.src",
"7Server-RH7-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el7.x86_64",
"7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el7.x86_64",
"7Server-RH7-RHOSE-4.6:haproxy-0:2.0.16-3.el7.src",
"7Server-RH7-RHOSE-4.6:haproxy-debuginfo-0:2.0.16-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:haproxy20-0:2.0.16-3.el7.x86_64",
"7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.6:python-boto-0:2.34.0-5.el7.noarch",
"7Server-RH7-RHOSE-4.6:python-boto-0:2.34.0-5.el7.src",
"7Server-RH7-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el7.src",
"7Server-RH7-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el7.x86_64",
"7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el7.x86_64",
"7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202203100145.p0.gfccb320.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202203100145.p0.gfccb320.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202203100145.p0.gfccb320.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el7.src",
"7Server-RH7-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el7.x86_64",
"7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202203150226.p0.g8abf85e.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202203150226.p0.g8abf85e.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202203150226.p0.g8abf85e.assembly.stream.el7.noarch",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el7.src",
"7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el7.x86_64",
"7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el7.x86_64",
"8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.aarch64",
"8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.ppc64le",
"8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.s390x",
"8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.src",
"8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.x86_64",
"8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.aarch64",
"8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.ppc64le",
"8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.s390x",
"8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.x86_64",
"8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.aarch64",
"8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.ppc64le",
"8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.s390x",
"8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.x86_64",
"8Base-RHOSE-4.10:openshift-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.src",
"8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.s390x",
"8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.src",
"8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.s390x",
"8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.s390x",
"8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.src",
"8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el8.x86_64",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.6-3.rhaos4.6.git3c20b65.el8.ppc64le",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.6-3.rhaos4.6.git3c20b65.el8.s390x",
"8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.6-3.rhaos4.6.git3c20b65.el8.x86_64",
"8Base-RHOSE-4.6:haproxy-0:2.0.16-5.el8.src",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-5.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-5.el8.s390x",
"8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-5.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-5.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-5.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-0:2.0.16-5.el8.x86_64",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-5.el8.ppc64le",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-5.el8.s390x",
"8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-5.el8.x86_64",
"8Base-RHOSE-4.6:openshift-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.src",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.s390x",
"8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.ppc64le",
"8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.s390x",
"8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.src",
"8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.x86_64",
"8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el8.ppc64le",
"8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el8.s390x",
"8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el8.x86_64",
"8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.5-3.rhaos4.8.gitaf64931.el8.ppc64le",
"8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.5-3.rhaos4.8.gitaf64931.el8.s390x",
"8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.5-3.rhaos4.8.gitaf64931.el8.x86_64",
"8Base-RHOSE-4.8:openshift-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.src",
"8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.s390x",
"8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.s390x",
"8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.src",
"8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.x86_64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.aarch64",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.ppc64le",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.s390x",
"8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.x86_64",
"8Base-RHOSE-4.9:haproxy-0:2.2.15-4.el8.src",
"8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.aarch64",
"8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.ppc64le",
"8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.s390x",
"8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.x86_64",
"8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.aarch64",
"8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.ppc64le",
"8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.s390x",
"8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.x86_64",
"8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.aarch64",
"8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.ppc64le",
"8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.s390x",
"8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.s390x",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.src",
"8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.aarch64",
"8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.ppc64le",
"8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.s390x",
"8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.src",
"8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.x86_64",
"8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.aarch64",
"8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.ppc64le",
"8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.s390x",
"8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.x86_64",
"8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.aarch64",
"8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.ppc64le",
"8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.s390x",
"8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.x86_64"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"For OpenShift Container Platform 3.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nDetails on how to access this content are available at https://docs.openshift.com/container-platform/3.11/updating/updating-cluster-cli.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/3.11/upgrading/index.html",
"For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html",
"For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html",
"For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html",
"For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html",
"For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html"
] | [
"2022-04-27T07:44:06+00:00",
"2022-03-28T11:56:19+00:00",
"2022-05-04T18:22:10+00:00",
"2022-04-13T13:49:48+00:00",
"2022-03-22T17:31:21+00:00",
"2022-03-29T07:05:08+00:00"
] |
CVE-2022-27148 | null | CVE-2022-27148 | null | null | null | GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integer Overflow. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-2441 | null | CVE-2022-2441 | null | null | null | The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site administrator into performing an action such as clicking on a link. This makes it possible for an attacker to create and or modify files hosted on the server which can easily grant attackers backdoor access to the affected server. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-39156 | null | CVE-2022-39156 | null | null | null | A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application is vulnerable to out of bounds read past the end of an allocated buffer when parsing X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-18196) | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-23808 | CWE-94 | phpMyAdmin | multiple XSS and HTML injection attacks in setup script | Moderate | null | 6.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-01-21T00:00:00+00:00 | 2022-01-10T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-41234 | null | CVE-2022-41234 | null | null | null | Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the /plugin/rundeck/webhook/ endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-21835 | null | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | null | null | null | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-11T08:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-36309 | null | CVE-2022-36309 | null | null | null | Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-07-19T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-49604 | null | kernel | ip: Fix data-races around sysctl_ip_fwd_use_pmtu. | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
While reading sysctl_ip_fwd_use_pmtu, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers. | null | 2025-02-26T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2022-48916 | CWE-672 | kernel | iommu/vt-d: Fix double list_add when enabling VMD in scalable mode | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Fix double list_add when enabling VMD in scalable mode
When enabling VMD and IOMMU scalable mode, the following kernel panic
call trace/kernel log is shown in Eagle Stream platform (Sapphire Rapids
CPU) during booting:
pci 0000:59:00.5: Adding to iommu group 42
...
vmd 0000:59:00.5: PCI host bridge to bus 10000:80
pci 10000:80:01.0: [8086:352a] type 01 class 0x060400
pci 10000:80:01.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
pci 10000:80:01.0: enabling Extended Tags
pci 10000:80:01.0: PME# supported from D0 D3hot D3cold
pci 10000:80:01.0: DMAR: Setup RID2PASID failed
pci 10000:80:01.0: Failed to add to iommu group 42: -16
pci 10000:80:03.0: [8086:352b] type 01 class 0x060400
pci 10000:80:03.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
pci 10000:80:03.0: enabling Extended Tags
pci 10000:80:03.0: PME# supported from D0 D3hot D3cold
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:29!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.17.0-rc3+ #7
Hardware name: Lenovo ThinkSystem SR650V3/SB27A86647, BIOS ESE101Y-1.00 01/13/2022
Workqueue: events work_for_cpu_fn
RIP: 0010:__list_add_valid.cold+0x26/0x3f
Code: 9a 4a ab ff 4c 89 c1 48 c7 c7 40 0c d9 9e e8 b9 b1 fe ff 0f
0b 48 89 f2 4c 89 c1 48 89 fe 48 c7 c7 f0 0c d9 9e e8 a2 b1
fe ff <0f> 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 98 0c d9
9e e8 8b b1 fe
RSP: 0000:ff5ad434865b3a40 EFLAGS: 00010246
RAX: 0000000000000058 RBX: ff4d61160b74b880 RCX: ff4d61255e1fffa8
RDX: 0000000000000000 RSI: 00000000fffeffff RDI: ffffffff9fd34f20
RBP: ff4d611d8e245c00 R08: 0000000000000000 R09: ff5ad434865b3888
R10: ff5ad434865b3880 R11: ff4d61257fdc6fe8 R12: ff4d61160b74b8a0
R13: ff4d61160b74b8a0 R14: ff4d611d8e245c10 R15: ff4d611d8001ba70
FS: 0000000000000000(0000) GS:ff4d611d5ea00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ff4d611fa1401000 CR3: 0000000aa0210001 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
<TASK>
intel_pasid_alloc_table+0x9c/0x1d0
dmar_insert_one_dev_info+0x423/0x540
? device_to_iommu+0x12d/0x2f0
intel_iommu_attach_device+0x116/0x290
__iommu_attach_device+0x1a/0x90
iommu_group_add_device+0x190/0x2c0
__iommu_probe_device+0x13e/0x250
iommu_probe_device+0x24/0x150
iommu_bus_notifier+0x69/0x90
blocking_notifier_call_chain+0x5a/0x80
device_add+0x3db/0x7b0
? arch_memremap_can_ram_remap+0x19/0x50
? memremap+0x75/0x140
pci_device_add+0x193/0x1d0
pci_scan_single_device+0xb9/0xf0
pci_scan_slot+0x4c/0x110
pci_scan_child_bus_extend+0x3a/0x290
vmd_enable_domain.constprop.0+0x63e/0x820
vmd_probe+0x163/0x190
local_pci_probe+0x42/0x80
work_for_cpu_fn+0x13/0x20
process_one_work+0x1e2/0x3b0
worker_thread+0x1c4/0x3a0
? rescuer_thread+0x370/0x370
kthread+0xc7/0xf0
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x1f/0x30
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
...
Kernel panic - not syncing: Fatal exception
Kernel Offset: 0x1ca00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
---[ end Kernel panic - not syncing: Fatal exception ]---
The following 'lspci' output shows devices '10000:80:*' are subdevices of
the VMD device 0000:59:00.5:
$ lspci
...
0000:59:00.5 RAID bus controller: Intel Corporation Volume Management Device NVMe RAID Controller (rev 20)
...
10000:80:01.0 PCI bridge: Intel Corporation Device 352a (rev 03)
10000:80:03.0 PCI bridge: Intel Corporation Device 352b (rev 03)
10000:80:05.0 PCI bridge: Intel Corporation Device 352c (rev 03)
10000:80:07.0 PCI bridge: Intel Corporation Device 352d (rev 03)
10000:81:00.0 Non-Volatile memory controller: Intel Corporation NVMe Datacenter SSD [3DNAND, Beta Rock Controller]
10000:82:00
---truncated--- | null | 2024-08-22T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2022-28317 | null | CVE-2022-28317 | null | null | null | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16369. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-44036 | null | CVE-2022-44036 | null | null | null | In b2evolution 7.2.5, if configured with admins_can_manipulate_sensitive_files, arbitrary file upload is allowed for admins, leading to command execution. NOTE: the vendor's position is that this is "very obviously a feature not an issue and if you don't like that feature it is very obvious how to disable it." | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-27518 | null | Unauthenticated remote arbitrary code execution | null | null | null | Unauthenticated remote arbitrary code execution
| Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-2011 | null | chromium-browser | Use after free in ANGLE | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | Use after free in ANGLE in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-06-10T00:00:00+00:00 | 2022-06-09T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2022-36923 | null | CVE-2022-36923 | null | null | null | Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-23222 | CWE-763 | kernel | local privileges escalation in kernel/bpf/verifier.c | Moderate | null | 7.4/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | A flaw was found in the Linux kernel's adjust_ptr_min_max_vals in the kernel/bpf/verifier.c function. In this flaw, a missing sanity check for *_OR_NULL pointer types that perform pointer arithmetic may cause a kernel information leak issue. | The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.
This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.
For the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.
For the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:
# cat /proc/sys/kernel/unprivileged_bpf_disabled
The setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.
A kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities. | 2022-01-14T00:00:00+00:00 | 2022-01-14T00:00:00+00:00 | [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.91.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.src",
"BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-abi-stablelists-0:4.18.0-553.el8_10.noarch",
"BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-doc-0:4.18.0-553.el8_10.noarch",
"BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:kernel-zfcpdump-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-zfcpdump-core-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-zfcpdump-devel-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-zfcpdump-modules-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.aarch64",
"BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.s390x",
"BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.src",
"BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.91.1.el8_6.noarch",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.81.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.81.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.src",
"CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-abi-stablelists-0:4.18.0-553.el8_10.noarch",
"CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-doc-0:4.18.0-553.el8_10.noarch",
"CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:kernel-zfcpdump-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-zfcpdump-core-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-zfcpdump-devel-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-zfcpdump-modules-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.x86_64",
"CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.aarch64",
"CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.ppc64le",
"CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.s390x",
"CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.src",
"CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.91.1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.81.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.81.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64",
"NFV-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.src",
"NFV-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-core-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-core-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-devel-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-modules-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-devel-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-modules-0:4.18.0-553.rt7.342.el8_10.x86_64",
"NFV-8.10.0.GA:kernel-rt-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.src",
"RT-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-core-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-core-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-devel-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-modules-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-devel-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-modules-0:4.18.0-553.rt7.342.el8_10.x86_64",
"RT-8.10.0.GA:kernel-rt-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64"
] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.s390x",
"BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64",
"red_hat_enterprise_linux_5:kernel",
"red_hat_enterprise_linux_6:kernel"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"workaround",
"no_fix_planned",
"no_fix_planned"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"Out of support scope",
"Will not fix"
] | [
"2024-02-07T16:33:42+00:00",
"2024-05-22T10:03:03+00:00",
"2024-11-26T00:55:09+00:00",
"2024-05-22T10:16:27+00:00",
null,
null,
null
] |
CVE-2022-4716 | null | WP Popups < 2.1.4.8 - Contributor+ Stored XSS | null | null | null | The WP Popups WordPress plugin before 2.1.4.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-42731 | null | CVE-2022-42731 | null | null | null | mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-1514 | null | Stored XSS via upload plugin functionality in zip format in neorazorx/facturascripts | null | null | null | Stored XSS via upload plugin functionality in zip format in GitHub repository neorazorx/facturascripts prior to 2022.06. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-32433 | null | CVE-2022-32433 | null | null | null | itsourcecode Advanced School Management System v1.0 is vulnerable to Arbitrary code execution via ip/school/view/all_teacher.php. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-32599 | null | CVE-2022-32599 | null | null | null | In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07460390. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-47499 | null | CVE-2022-47499 | null | null | null | In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-22960 | null | CVE-2022-22960 | null | null | null | VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-23672 | null | CVE-2022-23672 | null | null | null | A authenticated remote command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-4346 | null | All In One WP Security & Firewall < 5.1.3 - Configuration Leak | null | null | null | The All-In-One Security (AIOS) WordPress plugin before 5.1.3 leaked settings of the plugin publicly, including the used email address. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-26470 | null | CVE-2022-26470 | null | null | null | In aie, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07116037; Issue ID: ALPS07116037. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-3179 | null | Weak Password Requirements in ikus060/rdiffweb | null | null | null | Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-1144 | null | chromium-browser | Use after free in WebUI | Moderate | null | 6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | Use after free in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-03-30T00:00:00+00:00 | 2022-03-29T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-43989 | null | CVE-2022-43989 | null | null | null | Password recovery vulnerability in SICK SIM2x00 (ARM) Partnumber 1092673 and 1081902 with firmware version < 1.2.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 1.2.0 as soon as possible (available in SICK Support Portal). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-47163 | null | WordPress WP CSV to Database Plugin <= 2.6 is vulnerable to Cross Site Request Forgery (CSRF) | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in Tips and Tricks HQ, josh401 WP CSV to Database – Insert CSV file content into WordPress plugin <= 2.6 versions. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-48296 | null | CVE-2022-48296 | null | null | null | The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-36889 | null | CVE-2022-36889 | null | null | null | Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-22433 | null | CVE-2022-22433 | null | null | null | IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 224156. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-05-04T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-43120 | null | CVE-2022-43120 | null | null | null | A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-26923 | null | Active Directory Domain Services Elevation of Privilege Vulnerability | null | null | null | Active Directory Domain Services Elevation of Privilege Vulnerability | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-05-10T07:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-46322 | null | CVE-2022-46322 | null | null | null | Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-0305 | null | chromium-browser | Inappropriate implementation in Service Worker API | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-01-20T00:00:00+00:00 | 2022-01-19T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2022-33222 | null | Buffer over-read in Modem | null | null | null | Information disclosure due to buffer over-read while parsing DNS response packets in Modem. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-36470 | null | CVE-2022-36470 | null | null | null | H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAP5GWifiById. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-26889 | null | Path Traversal in search parameter results in external content injection | null | null | null | In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-43570 | null | XML External Entity Injection through a custom View in Splunk Enterprise | null | null | null | In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.
| Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-11-02T16:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-46288 | null | CVE-2022-46288 | null | null | null | Open redirect vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R4 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-2292 | null | SourceCodester Hotel Management System Room Edit Page 1 cross site scripting | null | null | null | A vulnerability classified as problematic has been found in SourceCodester Hotel Management System 2.0. Affected is an unknown function of the file /ci_hms/massage_room/edit/1 of the component Room Edit Page. The manipulation of the argument massageroomDetails with the input "><script>alert("XSS")</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-22063 | null | Memory corruption in Core | null | null | null | Memory corruption in Core due to improper configuration in boot remapper. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-0755 | null | Missing Authorization in salesagility/suitecrm | null | null | null | Missing Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-47860 | null | CVE-2022-47860 | null | null | null | Lead Management System v1.0 is vulnerable to SQL Injection via the id parameter in removeProduct.php. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-27261 | null | CVE-2022-27261 | null | null | null | An arbitrary file write vulnerability in Express-FileUpload v1.3.1 allows attackers to upload multiple files with the same name, causing an overwrite of files in the web application server. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-2768 | null | SourceCodester Library Management System cross site scripting | null | null | null | A vulnerability classified as problematic was found in SourceCodester Library Management System. This vulnerability affects unknown code of the file /qr/I/. The manipulation of the argument error leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-206164. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-22599 | null | CVE-2022-22599 | null | null | null | Description: A permissions issue was addressed with improved validation. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, macOS Monterey 12.3. A person with physical access to a device may be able to use Siri to obtain some location information from the lock screen. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-1847 | null | Rotating Posts <= 1.11 - Arbitrary Settings Update to Stored XSS via CSRF | null | null | null | The Rotating Posts WordPress plugin through 1.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-49487 | null | kernel | mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe()
It will cause null-ptr-deref when using 'res', if platform_get_resource()
returns NULL, so move using 'res' after devm_ioremap_resource() that
will check it to avoid null-ptr-deref. | null | 2025-02-26T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-28194 | null | CVE-2022-28194 | null | null | null | NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot module tegrabl_cbo.c, where, if TFTP is enabled, a local attacker with elevated privileges can cause a memory buffer overflow, which may lead to code execution, loss of Integrity, limited denial of service, and some impact to confidentiality. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-27774 | CWE-522 | curl | credential leak on redirect | Moderate | null | 5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L | A vulnerability was found in curl. This security flaw allows leaking credentials to other servers when it follows redirects from auth-protected HTTP(S) URLs to other protocols and port numbers. | null | 2022-04-21T00:00:00+00:00 | 2022-04-27T06:00:00+00:00 | [
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.src",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64"
] | [
".net_core_3.1_on_red_hat_enterprise_linux:rh-dotnet31-curl",
"red_hat_enterprise_linux_6:curl",
"red_hat_enterprise_linux_7:curl",
"red_hat_software_collections:httpd24-curl"
] | [
"red_hat_jboss_core_services:curl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"no_fix_planned",
"no_fix_planned"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Out of support scope",
"Will not fix"
] | [
"2022-07-01T00:07:15+00:00",
"2022-06-30T21:00:21+00:00",
null,
null
] |
CVE-2022-38878 | null | CVE-2022-38878 | null | null | null | School Activity Updates with SMS Notification v1.0 is vulnerable to SQL Injection via /activity/admin/modules/event/index.php?view=edit&id=. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-25749 | null | CVE-2022-25749 | null | null | null | Transient Denial-of-Service in WLAN due to buffer over-read while parsing MDNS frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-28481 | null | CVE-2022-28481 | null | null | null | CSV-Safe gem < 3.0.0 doesn't filter out special characters which could trigger CSV Injection. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-49192 | null | kernel | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
cpsw_ethtool_begin directly returns the result of pm_runtime_get_sync
when successful.
pm_runtime_get_sync returns -error code on failure and 0 on successful
resume but also 1 when the device is already active. So the common case
for cpsw_ethtool_begin is to return 1. That leads to inconsistent calls
to pm_runtime_put in the call-chain so that pm_runtime_put is called
one too many times and as result leaving the cpsw dev behind suspended.
The suspended cpsw dev leads to an access violation later on by
different parts of the cpsw driver.
Fix this by calling the return-friendly pm_runtime_resume_and_get
function. | null | 2025-02-26T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-34158 | null | User Group Privilege Escalation | null | null | null | A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-49468 | null | kernel | thermal/core: Fix memory leak in __thermal_cooling_device_register() | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
thermal/core: Fix memory leak in __thermal_cooling_device_register()
I got memory leak as follows when doing fault injection test:
unreferenced object 0xffff888010080000 (size 264312):
comm "182", pid 102533, jiffies 4296434960 (age 10.100s)
hex dump (first 32 bytes):
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
ff ff ff ff ff ff ff ff 40 7f 1f b9 ff ff ff ff ........@.......
backtrace:
[<0000000038b2f4fc>] kmalloc_order_trace+0x1d/0x110 mm/slab_common.c:969
[<00000000ebcb8da5>] __kmalloc+0x373/0x420 include/linux/slab.h:510
[<0000000084137f13>] thermal_cooling_device_setup_sysfs+0x15d/0x2d0 include/linux/slab.h:586
[<00000000352b8755>] __thermal_cooling_device_register+0x332/0xa60 drivers/thermal/thermal_core.c:927
[<00000000fb9f331b>] devm_thermal_of_cooling_device_register+0x6b/0xf0 drivers/thermal/thermal_core.c:1041
[<000000009b8012d2>] max6650_probe.cold+0x557/0x6aa drivers/hwmon/max6650.c:211
[<00000000da0b7e04>] i2c_device_probe+0x472/0xac0 drivers/i2c/i2c-core-base.c:561
If device_register() fails, thermal_cooling_device_destroy_sysfs() need be called
to free the memory allocated in thermal_cooling_device_setup_sysfs(). | null | 2025-02-26T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [
"red_hat_enterprise_linux_6:kernel"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2022-2787 | CWE-400 | schroot | denial of service in schroot | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | Schroot before 1.6.13 had too permissive rules on chroot or session names, allowing a denial of service on the schroot service for all users that may start a schroot session. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-08-22T00:00:00+00:00 | 2022-08-19T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-22576 | CWE-295 | curl | OAUTH2 bearer bypass in connection re-use | Moderate | null | 8.3/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N | A vulnerability was found in curl. This security flaw allows reusing OAUTH2-authenticated connections without properly ensuring that the connection was authenticated with the same credentials set for this transfer. This issue leads to an authentication bypass, either by mistake or by a malicious actor. | null | 2022-04-21T00:00:00+00:00 | 2022-04-27T06:00:00+00:00 | [
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src",
"AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.src",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64"
] | [
".net_core_3.1_on_red_hat_enterprise_linux:rh-dotnet31-curl",
"red_hat_software_collections:httpd24-curl"
] | [
"red_hat_enterprise_linux_6:curl",
"red_hat_enterprise_linux_7:curl",
"red_hat_jboss_core_services:curl"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"no_fix_planned",
"no_fix_planned"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Out of support scope",
"Will not fix"
] | [
"2022-07-01T00:07:15+00:00",
"2022-06-30T21:00:21+00:00",
null,
null
] |
CVE-2022-39290 | null | CSRF key bypass using HTTP methods in zoneminder | null | null | null | ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-41058 | null | Windows Network Address Translation (NAT) Denial of Service Vulnerability | null | null | null | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-11-08T08:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-45918 | null | CVE-2022-45918 | null | null | null | ILIAS before 7.16 allows External Control of File Name or Path. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-47925 | null | Insufficient Input Validation in the Endpoint of the csaf-validator-service | null | null | null | The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a partial DoS of the service. Only the request of the attacker is affected by this vulnerability. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-0610 | null | chromium-browser | Inappropriate implementation in Gamepad API | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-02-15T00:00:00+00:00 | 2022-02-14T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2022-25319 | null | CVE-2022-25319 | null | null | null | An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-1902 | CWE-497 | stackrox | Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext | Important | null | 9.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. Notifier secrets were not properly sanitized in the GraphQL API. This flaw allows authenticated ACS users to retrieve Notifiers from the GraphQL API, revealing secrets that can escalate their privileges. | null | 2022-05-27T00:00:00+00:00 | 2022-05-25T00:00:00+00:00 | [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:8ea2dd44cd9aee53482e36d88d57c0d352b27277c3c6a09973ad57499dc6c3d8_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-main-rhel8@sha256:d1257e71da7d928d57d587b37d9b6aa79c3a0532e87d3d24742613f623709082_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-main-rhel8@sha256:0c45ab080cd5f6429de49036fe846fe241c3044091dae245c2a6831cbdf20f65_amd64"
] | [] | [
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:83779a489e84b94446913ac6734182410f489d64201d4b3da2adc0c4d13f0140_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:1098aaf6a3315845b45658ad638ed0b4c5e1c164d48ccca1d45fc5448b93e307_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:9b3763478a960cbe92fff01348c02147f5b284caabdb319c3aecba94a7efe5ee_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:6a10a4859527946f61f497ff84b80f973cb7be5982d428423836b5aca81a1f5d_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:eb66d503d51e2524bbe4c6140672b9383da833578173baba50bb61ca2d92b635_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:8755ce5d1dd308e49671eda7f4f2deeb42acbefcffb47c4b82e7aca5665487aa_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:b2a7c913963711b387e0472754745a2b3467a4d6ffafa23bb8643282fbff8e34_amd64",
"8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:331775107475c3acf3536c4c1c8847519fd245236f1f209343f058805725eb0d_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-collector-rhel8@sha256:b1133a28779646b195f65221eb81cc5be95076d9c835d7ea072ec86ad9a4ba93_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:339f13fe43b1413c4a88778195ea937cc1a96b9790b443f876de7cadf152bce1_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-docs-rhel8@sha256:90457347e3b31e462d6b778274374c92d66faee30bae8162afb9c868ce537e54_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-operator-bundle@sha256:297e7f863106c6b41f882bbd5b691a12c797c24d832473a04e604d4639e4a68e_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-rhel8-operator@sha256:2816c185da5d27e5340a40c97b9c8cabb14b29ddb63ad7aea47fa697e2f264fb_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:5f478678df06ff4d666d0a0cdd2edbfafe1bd860cbced04e6ed10b3dfa70a85f_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f4f70356fc2e9d6d2129d31e4e5795c5cc5e08f754ffba663863363fb46c5760_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:c8e76bf5bb6d96904bf0d4b34b338bce7f96436625d0d982c007c6e7fee0f4f1_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-rhel8@sha256:fba8806142f5358194126cb8501d8bc2de7a2bdd8d5a4cb7fd32faa8bb09b289_amd64",
"8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cecd1a42674d57be482644e6986aefee90e315c767941c622297928a999b5057_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-collector-rhel8@sha256:1457880bb72cd6628abb1f12c1a63ddfdeccc4d6096f39a8653ef0335f471266_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:098c7751ddc217f1cdd6798b6424141c27e7e19ca437a8157e728c62f8fea423_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-docs-rhel8@sha256:297de60ddf71c1468a800f118e375fe5b5e0a6f11568e1da8a13a794433240c2_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-operator-bundle@sha256:9b35ae6df2c19935783735d213483f3fcecead2f49f873a4f7844ef9fb5c7f1a_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-rhel8-operator@sha256:9badb9eb5a21f7100b87a32833cc06c1c7f11aad977250af5ca24fb01318f862_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f92d7708730cd31ca0a0f1118b4635a68726ca1bbf0109b5bae238d7cf1a838_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a45ff3957c1357aface24b346e08974d2fe60661005fb8e94cc2909c251c72c7_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5e24f3e58f179e29f4e90b7fcc5478078dc60eae9e8095918c0484932472e9d2_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-rhel8@sha256:c779024230a63c6502dd84dc501b736789bb37210afb62fbf7cf243b9c748e58_amd64",
"8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:1db63101fcace1acd53dfd2278f2208fdb22295c6f0d9b9ac6d9ac1cdde1f544_amd64"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix"
] | [
"If you are using the RHACS 3.68.1, you are advised to upgrade to patch release 3.68.2.",
"If you are using the RHACS 3.69.1, you are advised to upgrade to patch release 3.69.2.",
"If you are using the RHACS 3.70.0, you are advised to upgrade to patch release 3.70.1."
] | [
"2022-06-20T17:22:16+00:00",
"2022-06-24T19:42:45+00:00",
"2022-06-27T10:19:57+00:00"
] |
CVE-2022-46637 | null | CVE-2022-46637 | null | null | null | Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-33737 | null | openvpn | weak random number generator | Moderate | null | null | The OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-07-07T00:00:00+00:00 | 2022-07-06T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2022-32825 | null | CVE-2022-32825 | null | null | null | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-30818 | null | CVE-2022-30818 | null | null | null | Wedding Management System v1.0 is vulnerable to SQL injection via /Wedding-Management/admin/blog_events_edit.php?id=31. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-49038 | null | CVE-2022-49038 | null | null | null | Inclusion of functionality from untrusted control sphere vulnerability in OpenSSL DLL component in Synology Drive Client before 3.3.0-15082 allows local users to execute arbitrary code via unspecified vectors. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-43435 | null | CVE-2022-43435 | null | null | null | Jenkins 360 FireLine Plugin 1.7.2 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-41408 | null | CVE-2022-41408 | null | null | null | Online Pet Shop We App v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-47476 | null | CVE-2022-47476 | null | null | null | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-1451 | CWE-125 | radare2 | Out-of-bounds read in r_bin_java_constant_value_attr_new function | Low | null | 4.3/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L | Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-04-25T00:00:00+00:00 | 2022-04-25T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2022-24158 | null | CVE-2022-24158 | null | null | null | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetIpMacBind. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-48783 | CWE-416 | kernel | net: dsa: lantiq_gswip: fix use after free in gswip_remove() | Moderate | null | 5.5/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H | In the Linux kernel, the following vulnerability has been resolved:
net: dsa: lantiq_gswip: fix use after free in gswip_remove()
of_node_put(priv->ds->slave_mii_bus->dev.of_node) should be
done before mdiobus_free(priv->ds->slave_mii_bus). | null | 2024-07-16T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"no_fix_planned"
] | [
"Out of support scope",
"Will not fix"
] | [
null,
null
] |
CVE-2022-37774 | null | CVE-2022-37774 | null | null | null | There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-48279 | CWE-1389 | mod_security | incorrect parsing of HTTP multipart requests leads to web application firewall bypass | Moderate | null | 7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | A vulnerability was found in ModSecurity. This issue occurs when HTTP multipart requests are incorrectly parsed and could bypass the Web Application Firewall. NOTE: This is related to CVE-2022-39956, but can be considered independent changes to the ModSecurity (C language) codebase. | null | 2023-01-24T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-29.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-29.el8jbcs.x86_64",
"Text-Only JBCS"
] | [
"red_hat_enterprise_linux_7:mod_security",
"red_hat_enterprise_linux_8:mod_security",
"red_hat_enterprise_linux_9:mod_security",
"red_hat_software_collections:httpd24-mod_security"
] | [
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.0-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.0-8.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-102.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.2.1-1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-5.el7jbcs.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-0:8.2.1-1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.2.1-1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-28.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-51.redhat_1.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-51.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-51.redhat_1.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-25.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el7jbcs.src",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.19-4.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-5.el7jbcs.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-5.el7jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.0-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.0-8.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-102.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:8.2.1-1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-5.el8jbcs.noarch",
"8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-0:8.2.1-1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:8.2.1-1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-libcurl-devel-0:8.2.1-1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-28.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-51.redhat_1.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-51.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-51.redhat_1.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-25.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el8jbcs.src",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.19-4.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-5.el8jbcs.x86_64",
"8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-5.el8jbcs.x86_64"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"no_fix_planned",
"no_fix_planned"
] | [
"Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Out of support scope",
"Will not fix"
] | [
"2023-08-15T17:43:48+00:00",
"2023-08-15T17:37:09+00:00",
null,
null
] |
CVE-2022-35749 | null | Windows Digital Media Receiver Elevation of Privilege Vulnerability | null | null | null | Windows Digital Media Receiver Elevation of Privilege Vulnerability | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-08-09T07:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-4653 | null | Greenshift – animation and page builder blocks < 4.8.9 - Contributor+ Stored XSS via Shortcode | null | null | null | The Greenshift WordPress plugin before 4.8.9 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-23367 | null | CVE-2022-23367 | null | null | null | Fulusso v1.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in /BindAccount/SuccessTips.js. This vulnerability allows attackers to inject malicious code into a victim user's device via open redirection. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-3196 | null | chromium-browser | Use after free in PDF | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2022-09-14T00:00:00+00:00 | 2022-09-14T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2022-40649 | null | CVE-2022-40649 | null | null | null | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17565. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-1001 | null | WP Downgrade < 1.2.3 - Admin+ Stored Cross-Site Scripting | null | null | null | The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-24508 | null | Win32 File Enumeration Remote Code Execution Vulnerability | null | null | null | Win32 File Enumeration Remote Code Execution Vulnerability | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-03-08T08:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-32126 | null | CVE-2022-32126 | null | null | null | 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-48629 | CWE-99 | kernel | crypto: qcom-rng - ensure buffer for generate is completely filled | Low | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | In the Linux kernel, the following vulnerability has been resolved:
crypto: qcom-rng - ensure buffer for generate is completely filled
The generate function in struct rng_alg expects that the destination
buffer is completely filled if the function returns 0. qcom_rng_read()
can run into a situation where the buffer is partially filled with
randomness and the remaining part of the buffer is zeroed since
qcom_rng_generate() doesn't check the return value. This issue can
be reproduced by running the following from libkcapi:
kcapi-rng -b 9000000 > OUTFILE
The generated OUTFILE will have three huge sections that contain all
zeros, and this is caused by the code where the test
'val & PRNG_STATUS_DATA_AVAIL' fails.
Let's fix this issue by ensuring that qcom_rng_read() always returns
with a full buffer if the function returns success. Let's also have
qcom_rng_generate() return the correct value.
Here's some statistics from the ent project
(https://www.fourmilab.ch/random/) that shows information about the
quality of the generated numbers:
$ ent -c qcom-random-before
Value Char Occurrences Fraction
0 606748 0.067416
1 33104 0.003678
2 33001 0.003667
...
253 � 32883 0.003654
254 � 33035 0.003671
255 � 33239 0.003693
Total: 9000000 1.000000
Entropy = 7.811590 bits per byte.
Optimum compression would reduce the size
of this 9000000 byte file by 2 percent.
Chi square distribution for 9000000 samples is 9329962.81, and
randomly would exceed this value less than 0.01 percent of the
times.
Arithmetic mean value of data bytes is 119.3731 (127.5 = random).
Monte Carlo value for Pi is 3.197293333 (error 1.77 percent).
Serial correlation coefficient is 0.159130 (totally uncorrelated =
0.0).
Without this patch, the results of the chi-square test is 0.01%, and
the numbers are certainly not random according to ent's project page.
The results improve with this patch:
$ ent -c qcom-random-after
Value Char Occurrences Fraction
0 35432 0.003937
1 35127 0.003903
2 35424 0.003936
...
253 � 35201 0.003911
254 � 34835 0.003871
255 � 35368 0.003930
Total: 9000000 1.000000
Entropy = 7.999979 bits per byte.
Optimum compression would reduce the size
of this 9000000 byte file by 0 percent.
Chi square distribution for 9000000 samples is 258.77, and randomly
would exceed this value 42.24 percent of the times.
Arithmetic mean value of data bytes is 127.5006 (127.5 = random).
Monte Carlo value for Pi is 3.141277333 (error 0.01 percent).
Serial correlation coefficient is 0.000468 (totally uncorrelated =
0.0).
This change was tested on a Nexus 5 phone (msm8974 SoC). | null | 2024-03-05T00:00:00+00:00 | 2022-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-rt",
"red_hat_enterprise_linux_8:kernel",
"red_hat_enterprise_linux_8:kernel-rt",
"red_hat_enterprise_linux_9:kernel",
"red_hat_enterprise_linux_9:kernel-rt"
] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [] | [] | [] |
CVE-2022-22825 | CWE-190 | expat | Integer overflow in lookup in xmlparse.c | Moderate | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | expat (libexpat) is susceptible to a software flaw that causes process interruption. When processing a large number of prefixed XML attributes on a single tag can libexpat can terminate unexpectedly due to integer overflow. The highest threat from this vulnerability is to availability, confidentiality and integrity. | null | 2022-01-15T00:00:00+00:00 | 2022-01-15T00:00:00+00:00 | [
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7Client-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7Server-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src",
"7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x",
"7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x",
"7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x",
"7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64",
"AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.aarch64",
"AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.i686",
"AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.ppc64le",
"AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.s390x",
"AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.src",
"AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.x86_64",
"AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.aarch64",
"AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.i686",
"AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.ppc64le",
"AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.s390x",
"AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.x86_64",
"AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.aarch64",
"AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.i686",
"AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.ppc64le",
"AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.s390x",
"AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.x86_64",
"AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.aarch64",
"AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.i686",
"AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.ppc64le",
"AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.s390x",
"AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.x86_64",
"BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.aarch64",
"BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.i686",
"BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.ppc64le",
"BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.s390x",
"BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.src",
"BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.x86_64",
"BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.aarch64",
"BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.i686",
"BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.ppc64le",
"BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.s390x",
"BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.x86_64",
"BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.aarch64",
"BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.i686",
"BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.ppc64le",
"BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.s390x",
"BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.x86_64",
"BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.aarch64",
"BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.i686",
"BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.ppc64le",
"BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.s390x",
"BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.src",
"BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.x86_64",
"BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.aarch64",
"BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.i686",
"BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.ppc64le",
"BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.s390x",
"BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.x86_64",
"BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.aarch64",
"BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.i686",
"BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.ppc64le",
"BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.s390x",
"BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.src",
"BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.x86_64",
"BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.aarch64",
"BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.i686",
"BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.ppc64le",
"BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.s390x",
"BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.x86_64",
"BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.aarch64",
"BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.i686",
"BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.ppc64le",
"BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.s390x",
"BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.x86_64",
"BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.aarch64",
"BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.i686",
"BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.ppc64le",
"BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.s390x",
"BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.src",
"CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.x86_64",
"CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.aarch64",
"CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.i686",
"CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.ppc64le",
"CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.s390x",
"CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.x86_64",
"Text-Only JBCS"
] | [
"red_hat_enterprise_linux_6:expat",
"red_hat_enterprise_linux_6:firefox",
"red_hat_enterprise_linux_6:thunderbird",
"red_hat_enterprise_linux_6:xulrunner",
"red_hat_enterprise_linux_7:firefox",
"red_hat_enterprise_linux_7:thunderbird",
"red_hat_enterprise_linux_7:xulrunner",
"red_hat_enterprise_linux_8:firefox",
"red_hat_enterprise_linux_8:thunderbird"
] | [
"red_hat_enterprise_linux_9:firefox",
"red_hat_enterprise_linux_9:thunderbird",
"red_hat_enterprise_linux_9:xmlrpc-c"
] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"no_fix_planned",
"no_fix_planned",
"none_available"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.",
"Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"Out of support scope",
"Will not fix",
"Affected"
] | [
"2022-03-28T12:01:28+00:00",
"2022-05-17T19:10:55+00:00",
"2022-03-16T16:21:41+00:00",
"2022-11-08T10:01:55+00:00",
"2022-10-26T20:05:57+00:00",
null,
null,
null
] |
CVE-2022-40219 | null | WordPress FavIcon Switcher plugin <= 1.2.11 - Cross-Site Request Forgery (CSRF) vulnerability | null | null | null | Cross-Site Request Forgery (CSRF) vulnerability in SedLex FavIcon Switcher plugin <= 1.2.11 at WordPress allows plugin settings change. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-09-21T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-2022-20818 | null | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | null | null | null | Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 2022-09-28T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
Subsets and Splits