cve
stringlengths
13
16
cwe
stringclasses
474 values
affected_component
stringlengths
0
255
summary
stringlengths
0
246
severity
stringclasses
5 values
cvss_v2
stringclasses
250 values
cvss_v3
stringlengths
37
48
description
stringlengths
20
4k
statement
stringlengths
31
2.49k
discovery_date
stringlengths
25
32
release_date
stringlengths
25
32
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
599
known_not_affected_products
sequencelengths
0
30.2k
under_investigation_products
sequencelengths
0
78
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
217
remediation_details
sequencelengths
0
217
remediation_dates
sequencelengths
0
217
CVE-2022-20377
null
CVE-2022-20377
null
null
null
In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-35876
null
CVE-2022-35876
null
null
null
Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` and `key` configuration parameters, as used within the `testWifiAP` XCMD handler
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-28747
null
CVE-2022-28747
null
null
null
Key reuse in GoSecure Titan Inbox Detection & Response (IDR) through 2022-04-05 leads to remote code execution. To exploit this vulnerability, an attacker must craft and sign a serialized payload.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-36759
null
CVE-2022-36759
null
null
null
Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /dishes.php?res_id=.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-29855
null
CVE-2022-29855
null
null
null
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-49254
null
kernel
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() In cal_ctx_v4l2_init_formats(), devm_kzalloc() is assigned to ctx->active_fmt and there is a dereference of it after that, which could lead to NULL pointer dereference on failure of devm_kzalloc(). Fix this bug by adding a NULL check of ctx->active_fmt. This bug was found by a static analyzer. Builds with 'make allyesconfig' show no new warnings, and our static analyzer no longer warns about this code.
null
2025-02-26T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-31566
null
CVE-2022-31566
null
null
null
The DSAB-local/DSAB repository through 2019-02-18 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-25175
CWE-78
workflow-multibranch
OS command execution through crafted SCM contents
Important
null
9.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
A flaw was found in Jenkins. The Pipeline: Multibranch uses the same checkout directories for distinct SCMs for the readTrusted step. This flaw allows attackers with item/configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.This allows attackers to compromise confidentiality, integrity, and availability.
null
2022-02-15T00:00:00+00:00
2022-02-15T00:00:00+00:00
[ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1650371376-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1650371376-1.el7.src", "8Base-RHOSE-4.10:jenkins-2-plugins-0:4.10.1647505461-1.el8.noarch", "8Base-RHOSE-4.10:jenkins-2-plugins-0:4.10.1647505461-1.el8.src", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1650364520-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1650364520-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1648800585-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1648800585-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1646993358-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1646993358-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1647580879-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1647580879-1.el8.src" ]
[]
[ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.685-1.g2e6be86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.685-1.g2e6be86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.685-1.g2e6be86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.685-1.g2e6be86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.685-1.g2e6be86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.685-1.git.0.7faaeaa.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.685-1.g99b2acf.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.685-1.g99b2acf.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.685-1.g99b2acf.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.685-1.gd435537.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.685-1.gd435537.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.685-1.gd435537.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.685-1.git.0.7faaeaa.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.685-1.g3571208.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.685-1.g3571208.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.685-1.git.0.7faaeaa.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.685-1.gf8bf728.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.685-1.gf8bf728.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.685-1.gf8bf728.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.685-1.gc8f26da.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.685-1.gc8f26da.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.685-1.gc8f26da.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.685-1.g39cfc66.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.685-1.g39cfc66.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.685-1.g39cfc66.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.685-1.git.0.7faaeaa.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.685-1.git.0.7faaeaa.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.685-1.gd742e61.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.685-1.gd742e61.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.685-1.gd742e61.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.685-1.gedebe84.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.685-1.gedebe84.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.685-1.gedebe84.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.685-1.g13de638.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.685-1.g609cd20.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.685-1.g99aae51.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.319.3.1650348949-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.319.3.1650348949-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.685-1.git.0.a9090ac.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.685-1.git.0.a9090ac.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.685-1.git.0.a9090ac.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.685-1.git.0.a9090ac.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.685-1.git.0.a9090ac.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.685-1.git.0.a9090ac.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.685-1.gf2f435d.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.685-1.gf2f435d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.685-1.gf2f435d.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.685-1.g22be164.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.685-1.g22be164.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.685-1.g22be164.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.685-1.g0c4bf66.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.685-1.g0c4bf66.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.685-1.g0c4bf66.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.685-1.g0c4bf66.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.685-1.g99aae51.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.685-1.g99aae51.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.685-1.g13de638.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.685-1.g13de638.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.685-1.g609cd20.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.685-1.g609cd20.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.685-1.g0c4bf66.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el7.x86_64", "7Server-RH7-RHOSE-4.6:haproxy-0:2.0.16-3.el7.src", "7Server-RH7-RHOSE-4.6:haproxy-debuginfo-0:2.0.16-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:haproxy20-0:2.0.16-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:python-boto-0:2.34.0-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto-0:2.34.0-5.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202203100145.p0.gfccb320.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202203100145.p0.gfccb320.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202203100145.p0.gfccb320.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202203150226.p0.g8abf85e.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202203150226.p0.g8abf85e.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202203150226.p0.g8abf85e.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.2-2.rhaos4.10.git071ae78.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.2-2.rhaos4.10.git071ae78.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.2-2.rhaos4.10.git071ae78.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202203170916.p0.g6de42bd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202203211237.p0.gb0357ed.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.6-3.rhaos4.6.git3c20b65.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.6-3.rhaos4.6.git3c20b65.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.6-3.rhaos4.6.git3c20b65.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.6-3.rhaos4.6.git3c20b65.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.6-3.rhaos4.6.git3c20b65.el8.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-5.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-5.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-5.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-5.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-5.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-5.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-5.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-5.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-5.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-5.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202203141645.p0.gec4226d.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.5-3.rhaos4.8.gitaf64931.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.5-3.rhaos4.8.gitaf64931.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.5-3.rhaos4.8.gitaf64931.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.5-3.rhaos4.8.gitaf64931.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.5-3.rhaos4.8.gitaf64931.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202203100757.p0.gee73ea2.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.3-2.rhaos4.9.git28c5a70.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.3-2.rhaos4.9.git28c5a70.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.3-2.rhaos4.9.git28c5a70.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-4.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-4.el8.x86_64", "8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.aarch64", "8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.ppc64le", "8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.s390x", "8Base-RHOSE-4.9:haproxy22-0:2.2.15-4.el8.x86_64", "8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.aarch64", "8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.ppc64le", "8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.s390x", "8Base-RHOSE-4.9:haproxy22-debuginfo-0:2.2.15-4.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202203221324.p0.ga646be5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-3.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-3.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-3.rhaos4.9.git4144b63.el8.x86_64" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "For OpenShift Container Platform 3.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nDetails on how to access this content are available at https://docs.openshift.com/container-platform/3.11/updating/updating-cluster-cli.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/3.11/upgrading/index.html", "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html" ]
[ "2022-04-27T07:44:06+00:00", "2022-03-28T11:56:19+00:00", "2022-05-04T18:22:10+00:00", "2022-04-13T13:49:48+00:00", "2022-03-22T17:31:21+00:00", "2022-03-29T07:05:08+00:00" ]
CVE-2022-27148
null
CVE-2022-27148
null
null
null
GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integer Overflow.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-2441
null
CVE-2022-2441
null
null
null
The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site administrator into performing an action such as clicking on a link. This makes it possible for an attacker to create and or modify files hosted on the server which can easily grant attackers backdoor access to the affected server.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-39156
null
CVE-2022-39156
null
null
null
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application is vulnerable to out of bounds read past the end of an allocated buffer when parsing X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-18196)
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-23808
CWE-94
phpMyAdmin
multiple XSS and HTML injection attacks in setup script
Moderate
null
6.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-01-21T00:00:00+00:00
2022-01-10T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-41234
null
CVE-2022-41234
null
null
null
Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the /plugin/rundeck/webhook/ endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-21835
null
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
null
null
null
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-11T08:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-36309
null
CVE-2022-36309
null
null
null
Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-07-19T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-49604
null
kernel
ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: ip: Fix data-races around sysctl_ip_fwd_use_pmtu. While reading sysctl_ip_fwd_use_pmtu, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
null
2025-02-26T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2022-48916
CWE-672
kernel
iommu/vt-d: Fix double list_add when enabling VMD in scalable mode
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix double list_add when enabling VMD in scalable mode When enabling VMD and IOMMU scalable mode, the following kernel panic call trace/kernel log is shown in Eagle Stream platform (Sapphire Rapids CPU) during booting: pci 0000:59:00.5: Adding to iommu group 42 ... vmd 0000:59:00.5: PCI host bridge to bus 10000:80 pci 10000:80:01.0: [8086:352a] type 01 class 0x060400 pci 10000:80:01.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit] pci 10000:80:01.0: enabling Extended Tags pci 10000:80:01.0: PME# supported from D0 D3hot D3cold pci 10000:80:01.0: DMAR: Setup RID2PASID failed pci 10000:80:01.0: Failed to add to iommu group 42: -16 pci 10000:80:03.0: [8086:352b] type 01 class 0x060400 pci 10000:80:03.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit] pci 10000:80:03.0: enabling Extended Tags pci 10000:80:03.0: PME# supported from D0 D3hot D3cold ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:29! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.17.0-rc3+ #7 Hardware name: Lenovo ThinkSystem SR650V3/SB27A86647, BIOS ESE101Y-1.00 01/13/2022 Workqueue: events work_for_cpu_fn RIP: 0010:__list_add_valid.cold+0x26/0x3f Code: 9a 4a ab ff 4c 89 c1 48 c7 c7 40 0c d9 9e e8 b9 b1 fe ff 0f 0b 48 89 f2 4c 89 c1 48 89 fe 48 c7 c7 f0 0c d9 9e e8 a2 b1 fe ff <0f> 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 98 0c d9 9e e8 8b b1 fe RSP: 0000:ff5ad434865b3a40 EFLAGS: 00010246 RAX: 0000000000000058 RBX: ff4d61160b74b880 RCX: ff4d61255e1fffa8 RDX: 0000000000000000 RSI: 00000000fffeffff RDI: ffffffff9fd34f20 RBP: ff4d611d8e245c00 R08: 0000000000000000 R09: ff5ad434865b3888 R10: ff5ad434865b3880 R11: ff4d61257fdc6fe8 R12: ff4d61160b74b8a0 R13: ff4d61160b74b8a0 R14: ff4d611d8e245c10 R15: ff4d611d8001ba70 FS: 0000000000000000(0000) GS:ff4d611d5ea00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ff4d611fa1401000 CR3: 0000000aa0210001 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <TASK> intel_pasid_alloc_table+0x9c/0x1d0 dmar_insert_one_dev_info+0x423/0x540 ? device_to_iommu+0x12d/0x2f0 intel_iommu_attach_device+0x116/0x290 __iommu_attach_device+0x1a/0x90 iommu_group_add_device+0x190/0x2c0 __iommu_probe_device+0x13e/0x250 iommu_probe_device+0x24/0x150 iommu_bus_notifier+0x69/0x90 blocking_notifier_call_chain+0x5a/0x80 device_add+0x3db/0x7b0 ? arch_memremap_can_ram_remap+0x19/0x50 ? memremap+0x75/0x140 pci_device_add+0x193/0x1d0 pci_scan_single_device+0xb9/0xf0 pci_scan_slot+0x4c/0x110 pci_scan_child_bus_extend+0x3a/0x290 vmd_enable_domain.constprop.0+0x63e/0x820 vmd_probe+0x163/0x190 local_pci_probe+0x42/0x80 work_for_cpu_fn+0x13/0x20 process_one_work+0x1e2/0x3b0 worker_thread+0x1c4/0x3a0 ? rescuer_thread+0x370/0x370 kthread+0xc7/0xf0 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x1f/0x30 </TASK> Modules linked in: ---[ end trace 0000000000000000 ]--- ... Kernel panic - not syncing: Fatal exception Kernel Offset: 0x1ca00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) ---[ end Kernel panic - not syncing: Fatal exception ]--- The following 'lspci' output shows devices '10000:80:*' are subdevices of the VMD device 0000:59:00.5: $ lspci ... 0000:59:00.5 RAID bus controller: Intel Corporation Volume Management Device NVMe RAID Controller (rev 20) ... 10000:80:01.0 PCI bridge: Intel Corporation Device 352a (rev 03) 10000:80:03.0 PCI bridge: Intel Corporation Device 352b (rev 03) 10000:80:05.0 PCI bridge: Intel Corporation Device 352c (rev 03) 10000:80:07.0 PCI bridge: Intel Corporation Device 352d (rev 03) 10000:81:00.0 Non-Volatile memory controller: Intel Corporation NVMe Datacenter SSD [3DNAND, Beta Rock Controller] 10000:82:00 ---truncated---
null
2024-08-22T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned" ]
[ "Out of support scope" ]
[ null ]
CVE-2022-28317
null
CVE-2022-28317
null
null
null
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16369.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-44036
null
CVE-2022-44036
null
null
null
In b2evolution 7.2.5, if configured with admins_can_manipulate_sensitive_files, arbitrary file upload is allowed for admins, leading to command execution. NOTE: the vendor's position is that this is "very obviously a feature not an issue and if you don't like that feature it is very obvious how to disable it."
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-27518
null
Unauthenticated remote arbitrary code execution
null
null
null
Unauthenticated remote arbitrary code execution
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-2011
null
chromium-browser
Use after free in ANGLE
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Use after free in ANGLE in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-06-10T00:00:00+00:00
2022-06-09T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2022-36923
null
CVE-2022-36923
null
null
null
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-23222
CWE-763
kernel
local privileges escalation in kernel/bpf/verifier.c
Moderate
null
7.4/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
A flaw was found in the Linux kernel's adjust_ptr_min_max_vals in the kernel/bpf/verifier.c function. In this flaw, a missing sanity check for *_OR_NULL pointer types that perform pointer arithmetic may cause a kernel information leak issue.
The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space. For the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled. For the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command: # cat /proc/sys/kernel/unprivileged_bpf_disabled The setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw. A kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.
2022-01-14T00:00:00+00:00
2022-01-14T00:00:00+00:00
[ "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.src", "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch", "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.91.1.el8_6.noarch", "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.91.1.el8_6.x86_64", "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.src", "BaseOS-8.10.0.GA:kernel-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-abi-stablelists-0:4.18.0-553.el8_10.noarch", "BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-doc-0:4.18.0-553.el8_10.noarch", "BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:kernel-zfcpdump-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-zfcpdump-core-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-zfcpdump-devel-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-zfcpdump-modules-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:perf-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.aarch64", "BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.ppc64le", "BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.s390x", "BaseOS-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.x86_64", "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.src", "BaseOS-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch", "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.91.1.el8_6.noarch", "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.src", "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.81.1.el8_8.noarch", "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.81.1.el8_8.noarch", "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.x86_64", "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:bpftool-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:bpftool-debuginfo-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.src", "CRB-8.10.0.GA:kernel-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-abi-stablelists-0:4.18.0-553.el8_10.noarch", "CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-core-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-cross-headers-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debug-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debug-core-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debug-debuginfo-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debug-devel-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debug-modules-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debug-modules-extra-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debuginfo-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-devel-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-doc-0:4.18.0-553.el8_10.noarch", "CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-headers-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-modules-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-modules-extra-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-tools-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-tools-debuginfo-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-tools-libs-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:kernel-tools-libs-devel-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:kernel-zfcpdump-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-zfcpdump-core-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-zfcpdump-devel-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-zfcpdump-modules-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:perf-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:perf-debuginfo-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:python3-perf-0:4.18.0-553.el8_10.x86_64", "CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.aarch64", "CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.ppc64le", "CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.s390x", "CRB-8.10.0.GA:python3-perf-debuginfo-0:4.18.0-553.el8_10.x86_64", "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:bpftool-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.src", "CRB-8.6.0.Z.EUS:kernel-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch", "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-core-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-doc-0:4.18.0-372.91.1.el8_6.noarch", "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:perf-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:python3-perf-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.src", "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.81.1.el8_8.noarch", "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.81.1.el8_8.noarch", "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.81.1.el8_8.x86_64", "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.aarch64", "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.ppc64le", "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.s390x", "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.81.1.el8_8.x86_64", "NFV-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.src", "NFV-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-core-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-core-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-devel-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-modules-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-devel-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-modules-0:4.18.0-553.rt7.342.el8_10.x86_64", "NFV-8.10.0.GA:kernel-rt-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.src", "RT-8.10.0.GA:kernel-rt-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-core-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-core-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-devel-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-modules-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debuginfo-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-devel-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-kvm-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-modules-0:4.18.0-553.rt7.342.el8_10.x86_64", "RT-8.10.0.GA:kernel-rt-modules-extra-0:4.18.0-553.rt7.342.el8_10.x86_64" ]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64", "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le", "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.s390x", "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le", "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.s390x", "BaseOS-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64", "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64", "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le", "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.s390x", "CRB-8.6.0.Z.EUS:kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64", "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "workaround", "no_fix_planned", "no_fix_planned" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "Out of support scope", "Will not fix" ]
[ "2024-02-07T16:33:42+00:00", "2024-05-22T10:03:03+00:00", "2024-11-26T00:55:09+00:00", "2024-05-22T10:16:27+00:00", null, null, null ]
CVE-2022-4716
null
WP Popups < 2.1.4.8 - Contributor+ Stored XSS
null
null
null
The WP Popups WordPress plugin before 2.1.4.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-42731
null
CVE-2022-42731
null
null
null
mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-1514
null
Stored XSS via upload plugin functionality in zip format in neorazorx/facturascripts
null
null
null
Stored XSS via upload plugin functionality in zip format in GitHub repository neorazorx/facturascripts prior to 2022.06. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-32433
null
CVE-2022-32433
null
null
null
itsourcecode Advanced School Management System v1.0 is vulnerable to Arbitrary code execution via ip/school/view/all_teacher.php.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-32599
null
CVE-2022-32599
null
null
null
In rpmb, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07460390; Issue ID: ALPS07460390.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-47499
null
CVE-2022-47499
null
null
null
In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-22960
null
CVE-2022-22960
null
null
null
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-23672
null
CVE-2022-23672
null
null
null
A authenticated remote command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-4346
null
All In One WP Security & Firewall < 5.1.3 - Configuration Leak
null
null
null
The All-In-One Security (AIOS) WordPress plugin before 5.1.3 leaked settings of the plugin publicly, including the used email address.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-26470
null
CVE-2022-26470
null
null
null
In aie, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07116037; Issue ID: ALPS07116037.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-3179
null
Weak Password Requirements in ikus060/rdiffweb
null
null
null
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-1144
null
chromium-browser
Use after free in WebUI
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Use after free in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-03-30T00:00:00+00:00
2022-03-29T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-43989
null
CVE-2022-43989
null
null
null
Password recovery vulnerability in SICK SIM2x00 (ARM) Partnumber 1092673 and 1081902 with firmware version < 1.2.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 1.2.0 as soon as possible (available in SICK Support Portal).
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-47163
null
WordPress WP CSV to Database Plugin <= 2.6 is vulnerable to Cross Site Request Forgery (CSRF)
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in Tips and Tricks HQ, josh401 WP CSV to Database – Insert CSV file content into WordPress plugin <= 2.6 versions.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-48296
null
CVE-2022-48296
null
null
null
The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-36889
null
CVE-2022-36889
null
null
null
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-22433
null
CVE-2022-22433
null
null
null
IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 224156.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-05-04T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-43120
null
CVE-2022-43120
null
null
null
A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-26923
null
Active Directory Domain Services Elevation of Privilege Vulnerability
null
null
null
Active Directory Domain Services Elevation of Privilege Vulnerability
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-05-10T07:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-46322
null
CVE-2022-46322
null
null
null
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-0305
null
chromium-browser
Inappropriate implementation in Service Worker API
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-01-20T00:00:00+00:00
2022-01-19T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2022-33222
null
Buffer over-read in Modem
null
null
null
Information disclosure due to buffer over-read while parsing DNS response packets in Modem.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-36470
null
CVE-2022-36470
null
null
null
H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAP5GWifiById.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-26889
null
Path Traversal in search parameter results in external content injection
null
null
null
In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing).
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-43570
null
XML External Entity Injection through a custom View in Splunk Enterprise
null
null
null
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-11-02T16:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-46288
null
CVE-2022-46288
null
null
null
Open redirect vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R4 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-2292
null
SourceCodester Hotel Management System Room Edit Page 1 cross site scripting
null
null
null
A vulnerability classified as problematic has been found in SourceCodester Hotel Management System 2.0. Affected is an unknown function of the file /ci_hms/massage_room/edit/1 of the component Room Edit Page. The manipulation of the argument massageroomDetails with the input "><script>alert("XSS")</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-22063
null
Memory corruption in Core
null
null
null
Memory corruption in Core due to improper configuration in boot remapper.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-0755
null
Missing Authorization in salesagility/suitecrm
null
null
null
Missing Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-47860
null
CVE-2022-47860
null
null
null
Lead Management System v1.0 is vulnerable to SQL Injection via the id parameter in removeProduct.php.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-27261
null
CVE-2022-27261
null
null
null
An arbitrary file write vulnerability in Express-FileUpload v1.3.1 allows attackers to upload multiple files with the same name, causing an overwrite of files in the web application server.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-2768
null
SourceCodester Library Management System cross site scripting
null
null
null
A vulnerability classified as problematic was found in SourceCodester Library Management System. This vulnerability affects unknown code of the file /qr/I/. The manipulation of the argument error leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-206164.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-22599
null
CVE-2022-22599
null
null
null
Description: A permissions issue was addressed with improved validation. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, macOS Monterey 12.3. A person with physical access to a device may be able to use Siri to obtain some location information from the lock screen.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-1847
null
Rotating Posts <= 1.11 - Arbitrary Settings Update to Stored XSS via CSRF
null
null
null
The Rotating Posts WordPress plugin through 1.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-49487
null
kernel
mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe()
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() It will cause null-ptr-deref when using 'res', if platform_get_resource() returns NULL, so move using 'res' after devm_ioremap_resource() that will check it to avoid null-ptr-deref.
null
2025-02-26T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-28194
null
CVE-2022-28194
null
null
null
NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot module tegrabl_cbo.c, where, if TFTP is enabled, a local attacker with elevated privileges can cause a memory buffer overflow, which may lead to code execution, loss of Integrity, limited denial of service, and some impact to confidentiality.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-27774
CWE-522
curl
credential leak on redirect
Moderate
null
5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
A vulnerability was found in curl. This security flaw allows leaking credentials to other servers when it follows redirects from auth-protected HTTP(S) URLs to other protocols and port numbers.
null
2022-04-21T00:00:00+00:00
2022-04-27T06:00:00+00:00
[ "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.src", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64" ]
[ ".net_core_3.1_on_red_hat_enterprise_linux:rh-dotnet31-curl", "red_hat_enterprise_linux_6:curl", "red_hat_enterprise_linux_7:curl", "red_hat_software_collections:httpd24-curl" ]
[ "red_hat_jboss_core_services:curl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "no_fix_planned", "no_fix_planned" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Out of support scope", "Will not fix" ]
[ "2022-07-01T00:07:15+00:00", "2022-06-30T21:00:21+00:00", null, null ]
CVE-2022-38878
null
CVE-2022-38878
null
null
null
School Activity Updates with SMS Notification v1.0 is vulnerable to SQL Injection via /activity/admin/modules/event/index.php?view=edit&id=.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-25749
null
CVE-2022-25749
null
null
null
Transient Denial-of-Service in WLAN due to buffer over-read while parsing MDNS frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-28481
null
CVE-2022-28481
null
null
null
CSV-Safe gem < 3.0.0 doesn't filter out special characters which could trigger CSV Injection.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-49192
null
kernel
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool cpsw_ethtool_begin directly returns the result of pm_runtime_get_sync when successful. pm_runtime_get_sync returns -error code on failure and 0 on successful resume but also 1 when the device is already active. So the common case for cpsw_ethtool_begin is to return 1. That leads to inconsistent calls to pm_runtime_put in the call-chain so that pm_runtime_put is called one too many times and as result leaving the cpsw dev behind suspended. The suspended cpsw dev leads to an access violation later on by different parts of the cpsw driver. Fix this by calling the return-friendly pm_runtime_resume_and_get function.
null
2025-02-26T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-34158
null
User Group Privilege Escalation
null
null
null
A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-49468
null
kernel
thermal/core: Fix memory leak in __thermal_cooling_device_register()
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: thermal/core: Fix memory leak in __thermal_cooling_device_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff888010080000 (size 264312): comm "182", pid 102533, jiffies 4296434960 (age 10.100s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 7f 1f b9 ff ff ff ff ........@....... backtrace: [<0000000038b2f4fc>] kmalloc_order_trace+0x1d/0x110 mm/slab_common.c:969 [<00000000ebcb8da5>] __kmalloc+0x373/0x420 include/linux/slab.h:510 [<0000000084137f13>] thermal_cooling_device_setup_sysfs+0x15d/0x2d0 include/linux/slab.h:586 [<00000000352b8755>] __thermal_cooling_device_register+0x332/0xa60 drivers/thermal/thermal_core.c:927 [<00000000fb9f331b>] devm_thermal_of_cooling_device_register+0x6b/0xf0 drivers/thermal/thermal_core.c:1041 [<000000009b8012d2>] max6650_probe.cold+0x557/0x6aa drivers/hwmon/max6650.c:211 [<00000000da0b7e04>] i2c_device_probe+0x472/0xac0 drivers/i2c/i2c-core-base.c:561 If device_register() fails, thermal_cooling_device_destroy_sysfs() need be called to free the memory allocated in thermal_cooling_device_setup_sysfs().
null
2025-02-26T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2022-2787
CWE-400
schroot
denial of service in schroot
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Schroot before 1.6.13 had too permissive rules on chroot or session names, allowing a denial of service on the schroot service for all users that may start a schroot session.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-08-22T00:00:00+00:00
2022-08-19T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-22576
CWE-295
curl
OAUTH2 bearer bypass in connection re-use
Moderate
null
8.3/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
A vulnerability was found in curl. This security flaw allows reusing OAUTH2-authenticated connections without properly ensuring that the connection was authenticated with the same credentials set for this transfer. This issue leads to an authentication bypass, either by mistake or by a malicious actor.
null
2022-04-21T00:00:00+00:00
2022-04-27T06:00:00+00:00
[ "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src", "AppStream-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "AppStream-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.src", "BaseOS-8.6.0.Z.MAIN.EUS:curl-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-debugsource-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-devel-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.i686", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.61.1-22.el8_6.3.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.src", "BaseOS-9.0.0.Z.MAIN.EUS:curl-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-debugsource-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:curl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-debuginfo-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-devel-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-0:7.76.1-14.el9_0.4.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.i686", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:libcurl-minimal-debuginfo-0:7.76.1-14.el9_0.4.x86_64" ]
[ ".net_core_3.1_on_red_hat_enterprise_linux:rh-dotnet31-curl", "red_hat_software_collections:httpd24-curl" ]
[ "red_hat_enterprise_linux_6:curl", "red_hat_enterprise_linux_7:curl", "red_hat_jboss_core_services:curl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "no_fix_planned", "no_fix_planned" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Out of support scope", "Will not fix" ]
[ "2022-07-01T00:07:15+00:00", "2022-06-30T21:00:21+00:00", null, null ]
CVE-2022-39290
null
CSRF key bypass using HTTP methods in zoneminder
null
null
null
ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-41058
null
Windows Network Address Translation (NAT) Denial of Service Vulnerability
null
null
null
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-11-08T08:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-45918
null
CVE-2022-45918
null
null
null
ILIAS before 7.16 allows External Control of File Name or Path.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-47925
null
Insufficient Input Validation in the Endpoint of the csaf-validator-service
null
null
null
The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a partial DoS of the service. Only the request of the attacker is affected by this vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-0610
null
chromium-browser
Inappropriate implementation in Gamepad API
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-02-15T00:00:00+00:00
2022-02-14T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2022-25319
null
CVE-2022-25319
null
null
null
An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-1902
CWE-497
stackrox
Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext
Important
null
9.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. Notifier secrets were not properly sanitized in the GraphQL API. This flaw allows authenticated ACS users to retrieve Notifiers from the GraphQL API, revealing secrets that can escalate their privileges.
null
2022-05-27T00:00:00+00:00
2022-05-25T00:00:00+00:00
[ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-main-rhel8@sha256:8ea2dd44cd9aee53482e36d88d57c0d352b27277c3c6a09973ad57499dc6c3d8_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-main-rhel8@sha256:d1257e71da7d928d57d587b37d9b6aa79c3a0532e87d3d24742613f623709082_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-main-rhel8@sha256:0c45ab080cd5f6429de49036fe846fe241c3044091dae245c2a6831cbdf20f65_amd64" ]
[]
[ "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-rhel8@sha256:83779a489e84b94446913ac6734182410f489d64201d4b3da2adc0c4d13f0140_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:1098aaf6a3315845b45658ad638ed0b4c5e1c164d48ccca1d45fc5448b93e307_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-docs-rhel8@sha256:9b3763478a960cbe92fff01348c02147f5b284caabdb319c3aecba94a7efe5ee_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-operator-bundle@sha256:6a10a4859527946f61f497ff84b80f973cb7be5982d428423836b5aca81a1f5d_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-rhel8-operator@sha256:eb66d503d51e2524bbe4c6140672b9383da833578173baba50bb61ca2d92b635_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:8755ce5d1dd308e49671eda7f4f2deeb42acbefcffb47c4b82e7aca5665487aa_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:b2a7c913963711b387e0472754745a2b3467a4d6ffafa23bb8643282fbff8e34_amd64", "8Base-RHACS-3.68:advanced-cluster-security/rhacs-scanner-rhel8@sha256:331775107475c3acf3536c4c1c8847519fd245236f1f209343f058805725eb0d_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-collector-rhel8@sha256:b1133a28779646b195f65221eb81cc5be95076d9c835d7ea072ec86ad9a4ba93_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:339f13fe43b1413c4a88778195ea937cc1a96b9790b443f876de7cadf152bce1_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-docs-rhel8@sha256:90457347e3b31e462d6b778274374c92d66faee30bae8162afb9c868ce537e54_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-operator-bundle@sha256:297e7f863106c6b41f882bbd5b691a12c797c24d832473a04e604d4639e4a68e_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-rhel8-operator@sha256:2816c185da5d27e5340a40c97b9c8cabb14b29ddb63ad7aea47fa697e2f264fb_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:5f478678df06ff4d666d0a0cdd2edbfafe1bd860cbced04e6ed10b3dfa70a85f_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:f4f70356fc2e9d6d2129d31e4e5795c5cc5e08f754ffba663863363fb46c5760_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:c8e76bf5bb6d96904bf0d4b34b338bce7f96436625d0d982c007c6e7fee0f4f1_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-rhel8@sha256:fba8806142f5358194126cb8501d8bc2de7a2bdd8d5a4cb7fd32faa8bb09b289_amd64", "8Base-RHACS-3.69:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:cecd1a42674d57be482644e6986aefee90e315c767941c622297928a999b5057_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-collector-rhel8@sha256:1457880bb72cd6628abb1f12c1a63ddfdeccc4d6096f39a8653ef0335f471266_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:098c7751ddc217f1cdd6798b6424141c27e7e19ca437a8157e728c62f8fea423_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-docs-rhel8@sha256:297de60ddf71c1468a800f118e375fe5b5e0a6f11568e1da8a13a794433240c2_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-operator-bundle@sha256:9b35ae6df2c19935783735d213483f3fcecead2f49f873a4f7844ef9fb5c7f1a_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-rhel8-operator@sha256:9badb9eb5a21f7100b87a32833cc06c1c7f11aad977250af5ca24fb01318f862_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:7f92d7708730cd31ca0a0f1118b4635a68726ca1bbf0109b5bae238d7cf1a838_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:a45ff3957c1357aface24b346e08974d2fe60661005fb8e94cc2909c251c72c7_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:5e24f3e58f179e29f4e90b7fcc5478078dc60eae9e8095918c0484932472e9d2_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-rhel8@sha256:c779024230a63c6502dd84dc501b736789bb37210afb62fbf7cf243b9c748e58_amd64", "8Base-RHACS-3.70:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:1db63101fcace1acd53dfd2278f2208fdb22295c6f0d9b9ac6d9ac1cdde1f544_amd64" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "If you are using the RHACS 3.68.1, you are advised to upgrade to patch release 3.68.2.", "If you are using the RHACS 3.69.1, you are advised to upgrade to patch release 3.69.2.", "If you are using the RHACS 3.70.0, you are advised to upgrade to patch release 3.70.1." ]
[ "2022-06-20T17:22:16+00:00", "2022-06-24T19:42:45+00:00", "2022-06-27T10:19:57+00:00" ]
CVE-2022-46637
null
CVE-2022-46637
null
null
null
Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-33737
null
openvpn
weak random number generator
Moderate
null
null
The OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-07-07T00:00:00+00:00
2022-07-06T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2022-32825
null
CVE-2022-32825
null
null
null
The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-30818
null
CVE-2022-30818
null
null
null
Wedding Management System v1.0 is vulnerable to SQL injection via /Wedding-Management/admin/blog_events_edit.php?id=31.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-49038
null
CVE-2022-49038
null
null
null
Inclusion of functionality from untrusted control sphere vulnerability in OpenSSL DLL component in Synology Drive Client before 3.3.0-15082 allows local users to execute arbitrary code via unspecified vectors.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-43435
null
CVE-2022-43435
null
null
null
Jenkins 360 FireLine Plugin 1.7.2 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-41408
null
CVE-2022-41408
null
null
null
Online Pet Shop We App v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-47476
null
CVE-2022-47476
null
null
null
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-1451
CWE-125
radare2
Out-of-bounds read in r_bin_java_constant_value_attr_new function
Low
null
4.3/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-04-25T00:00:00+00:00
2022-04-25T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2022-24158
null
CVE-2022-24158
null
null
null
Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetIpMacBind. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-48783
CWE-416
kernel
net: dsa: lantiq_gswip: fix use after free in gswip_remove()
Moderate
null
5.5/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
In the Linux kernel, the following vulnerability has been resolved: net: dsa: lantiq_gswip: fix use after free in gswip_remove() of_node_put(priv->ds->slave_mii_bus->dev.of_node) should be done before mdiobus_free(priv->ds->slave_mii_bus).
null
2024-07-16T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "no_fix_planned" ]
[ "Out of support scope", "Will not fix" ]
[ null, null ]
CVE-2022-37774
null
CVE-2022-37774
null
null
null
There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-48279
CWE-1389
mod_security
incorrect parsing of HTTP multipart requests leads to web application firewall bypass
Moderate
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
A vulnerability was found in ModSecurity. This issue occurs when HTTP multipart requests are incorrectly parsed and could bypass the Web Application Firewall. NOTE: This is related to CVE-2022-39956, but can be considered independent changes to the ModSecurity (C language) codebase.
null
2023-01-24T00:00:00+00:00
2022-01-01T00:00:00+00:00
[ "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-29.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-29.el8jbcs.x86_64", "Text-Only JBCS" ]
[ "red_hat_enterprise_linux_7:mod_security", "red_hat_enterprise_linux_8:mod_security", "red_hat_enterprise_linux_9:mod_security", "red_hat_software_collections:httpd24-mod_security" ]
[ "7Server-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.0-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.7.0-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-102.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:8.2.1-1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-5.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:8.2.1-1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:8.2.1-1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-28.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-51.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-51.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-51.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-25.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.19-4.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-5.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-5.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.7.0-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.7.0-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.7.0-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-102.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:8.2.1-1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:8.2.1-1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-5.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:8.2.1-1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:8.2.1-1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:8.2.1-1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-28.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-28.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-51.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-51.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-51.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-25.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-25.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.19-4.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.19-4.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-5.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-5.el8jbcs.x86_64" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "no_fix_planned", "no_fix_planned" ]
[ "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Out of support scope", "Will not fix" ]
[ "2023-08-15T17:43:48+00:00", "2023-08-15T17:37:09+00:00", null, null ]
CVE-2022-35749
null
Windows Digital Media Receiver Elevation of Privilege Vulnerability
null
null
null
Windows Digital Media Receiver Elevation of Privilege Vulnerability
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-08-09T07:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-4653
null
Greenshift – animation and page builder blocks < 4.8.9 - Contributor+ Stored XSS via Shortcode
null
null
null
The Greenshift WordPress plugin before 4.8.9 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-23367
null
CVE-2022-23367
null
null
null
Fulusso v1.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in /BindAccount/SuccessTips.js. This vulnerability allows attackers to inject malicious code into a victim user's device via open redirection.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-3196
null
chromium-browser
Use after free in PDF
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2022-09-14T00:00:00+00:00
2022-09-14T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2022-40649
null
CVE-2022-40649
null
null
null
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17565.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-1001
null
WP Downgrade < 1.2.3 - Admin+ Stored Cross-Site Scripting
null
null
null
The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-24508
null
Win32 File Enumeration Remote Code Execution Vulnerability
null
null
null
Win32 File Enumeration Remote Code Execution Vulnerability
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-03-08T08:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-32126
null
CVE-2022-32126
null
null
null
74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-48629
CWE-99
kernel
crypto: qcom-rng - ensure buffer for generate is completely filled
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: crypto: qcom-rng - ensure buffer for generate is completely filled The generate function in struct rng_alg expects that the destination buffer is completely filled if the function returns 0. qcom_rng_read() can run into a situation where the buffer is partially filled with randomness and the remaining part of the buffer is zeroed since qcom_rng_generate() doesn't check the return value. This issue can be reproduced by running the following from libkcapi: kcapi-rng -b 9000000 > OUTFILE The generated OUTFILE will have three huge sections that contain all zeros, and this is caused by the code where the test 'val & PRNG_STATUS_DATA_AVAIL' fails. Let's fix this issue by ensuring that qcom_rng_read() always returns with a full buffer if the function returns success. Let's also have qcom_rng_generate() return the correct value. Here's some statistics from the ent project (https://www.fourmilab.ch/random/) that shows information about the quality of the generated numbers: $ ent -c qcom-random-before Value Char Occurrences Fraction 0 606748 0.067416 1 33104 0.003678 2 33001 0.003667 ... 253 � 32883 0.003654 254 � 33035 0.003671 255 � 33239 0.003693 Total: 9000000 1.000000 Entropy = 7.811590 bits per byte. Optimum compression would reduce the size of this 9000000 byte file by 2 percent. Chi square distribution for 9000000 samples is 9329962.81, and randomly would exceed this value less than 0.01 percent of the times. Arithmetic mean value of data bytes is 119.3731 (127.5 = random). Monte Carlo value for Pi is 3.197293333 (error 1.77 percent). Serial correlation coefficient is 0.159130 (totally uncorrelated = 0.0). Without this patch, the results of the chi-square test is 0.01%, and the numbers are certainly not random according to ent's project page. The results improve with this patch: $ ent -c qcom-random-after Value Char Occurrences Fraction 0 35432 0.003937 1 35127 0.003903 2 35424 0.003936 ... 253 � 35201 0.003911 254 � 34835 0.003871 255 � 35368 0.003930 Total: 9000000 1.000000 Entropy = 7.999979 bits per byte. Optimum compression would reduce the size of this 9000000 byte file by 0 percent. Chi square distribution for 9000000 samples is 258.77, and randomly would exceed this value 42.24 percent of the times. Arithmetic mean value of data bytes is 127.5006 (127.5 = random). Monte Carlo value for Pi is 3.141277333 (error 0.01 percent). Serial correlation coefficient is 0.000468 (totally uncorrelated = 0.0). This change was tested on a Nexus 5 phone (msm8974 SoC).
null
2024-03-05T00:00:00+00:00
2022-01-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2022-22825
CWE-190
expat
Integer overflow in lookup in xmlparse.c
Moderate
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
expat (libexpat) is susceptible to a software flaw that causes process interruption. When processing a large number of prefixed XML attributes on a single tag can libexpat can terminate unexpectedly due to integer overflow. The highest threat from this vulnerability is to availability, confidentiality and integrity.
null
2022-01-15T00:00:00+00:00
2022-01-15T00:00:00+00:00
[ "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7Client-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7Client-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7Client-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7Client-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7Client-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7Client-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7Client-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7Client-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7ComputeNode-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7ComputeNode-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7ComputeNode-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7ComputeNode-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7Server-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7Server-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7Server-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7Server-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7Server-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7Server-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7Server-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7Server-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7Workstation-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7Workstation-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7Workstation-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7Workstation-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.i686", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.ppc64le", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.s390x", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.src", "7Workstation-optional-7.9.Z:expat-0:2.1.0-14.el7_9.x86_64", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.i686", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.ppc64le", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.s390x", "7Workstation-optional-7.9.Z:expat-debuginfo-0:2.1.0-14.el7_9.x86_64", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.i686", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.ppc64le", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.s390x", "7Workstation-optional-7.9.Z:expat-devel-0:2.1.0-14.el7_9.x86_64", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.i686", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.ppc64le", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.s390x", "7Workstation-optional-7.9.Z:expat-static-0:2.1.0-14.el7_9.x86_64", "AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.aarch64", "AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.i686", "AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.ppc64le", "AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.s390x", "AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.src", "AppStream-9.0.0.GA:expat-0:2.2.10-12.el9_0.x86_64", "AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.aarch64", "AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.i686", "AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.ppc64le", "AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.s390x", "AppStream-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.x86_64", "AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.aarch64", "AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.i686", "AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.ppc64le", "AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.s390x", "AppStream-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.x86_64", "AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.aarch64", "AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.i686", "AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.ppc64le", "AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.s390x", "AppStream-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.x86_64", "BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.aarch64", "BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.i686", "BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.ppc64le", "BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.s390x", "BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.src", "BaseOS-8.5.0.Z.MAIN:expat-0:2.2.5-4.el8_5.3.x86_64", "BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.aarch64", "BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.i686", "BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.ppc64le", "BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.s390x", "BaseOS-8.5.0.Z.MAIN:expat-debuginfo-0:2.2.5-4.el8_5.3.x86_64", "BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.aarch64", "BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.i686", "BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.ppc64le", "BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.s390x", "BaseOS-8.5.0.Z.MAIN:expat-debugsource-0:2.2.5-4.el8_5.3.x86_64", "BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.aarch64", "BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.i686", "BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.ppc64le", "BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.s390x", "BaseOS-8.5.0.Z.MAIN:expat-devel-0:2.2.5-4.el8_5.3.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.src", "BaseOS-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.x86_64", "BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.aarch64", "BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.i686", "BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.ppc64le", "BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.s390x", "BaseOS-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.x86_64", "BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.aarch64", "BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.i686", "BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.ppc64le", "BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.s390x", "BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.src", "BaseOS-9.0.0.GA:expat-0:2.2.10-12.el9_0.x86_64", "BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.aarch64", "BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.i686", "BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.ppc64le", "BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.s390x", "BaseOS-9.0.0.GA:expat-debuginfo-0:2.2.10-12.el9_0.x86_64", "BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.aarch64", "BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.i686", "BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.ppc64le", "BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.s390x", "BaseOS-9.0.0.GA:expat-debugsource-0:2.2.10-12.el9_0.x86_64", "BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.aarch64", "BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.i686", "BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.ppc64le", "BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.s390x", "BaseOS-9.0.0.GA:expat-devel-0:2.2.10-12.el9_0.x86_64", "CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.src", "CRB-8.7.0.GA:xmlrpc-c-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-apps-debuginfo-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-c++-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-c++-debuginfo-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-client++-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-client++-debuginfo-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-client-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-client-debuginfo-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-debuginfo-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-debugsource-0:1.51.0-8.el8.x86_64", "CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.aarch64", "CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.i686", "CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.ppc64le", "CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.s390x", "CRB-8.7.0.GA:xmlrpc-c-devel-0:1.51.0-8.el8.x86_64", "Text-Only JBCS" ]
[ "red_hat_enterprise_linux_6:expat", "red_hat_enterprise_linux_6:firefox", "red_hat_enterprise_linux_6:thunderbird", "red_hat_enterprise_linux_6:xulrunner", "red_hat_enterprise_linux_7:firefox", "red_hat_enterprise_linux_7:thunderbird", "red_hat_enterprise_linux_7:xulrunner", "red_hat_enterprise_linux_8:firefox", "red_hat_enterprise_linux_8:thunderbird" ]
[ "red_hat_enterprise_linux_9:firefox", "red_hat_enterprise_linux_9:thunderbird", "red_hat_enterprise_linux_9:xmlrpc-c" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "no_fix_planned", "no_fix_planned", "none_available" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Out of support scope", "Will not fix", "Affected" ]
[ "2022-03-28T12:01:28+00:00", "2022-05-17T19:10:55+00:00", "2022-03-16T16:21:41+00:00", "2022-11-08T10:01:55+00:00", "2022-10-26T20:05:57+00:00", null, null, null ]
CVE-2022-40219
null
WordPress FavIcon Switcher plugin <= 1.2.11 - Cross-Site Request Forgery (CSRF) vulnerability
null
null
null
Cross-Site Request Forgery (CSRF) vulnerability in SedLex FavIcon Switcher plugin <= 1.2.11 at WordPress allows plugin settings change.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-09-21T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2022-20818
null
Cisco SD-WAN Software Privilege Escalation Vulnerabilities
null
null
null
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
null
2022-09-28T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]