Security patch release notes

Review the release notes for security patches for 2.0.x Cloud Pak for Data System.

Security patches are tied to the version of Red Hat Linux that is installed on Cloud Pak for Data System.

The patches for a specific Red Hat release are cumulative. For example, if your system is on 8.6, you only need to install the latest patch that applies to 8.6, there is no need to install all of them one by one.

Verify that which patch can be installed on your system. Do not apply the patch if the Red Hat Linux version on your system does not match.

For installation, see Applying security patches. Downtime is required when installing the security patch.

8.8.24.08.SP20

The release date of the 8.8.24.08.SP20 security patch is 4 September 2024. The estimated run time is around 60 minutes.

Restriction: The 8.8.24.08.SP20 security patch is based on RHEL 8.8, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF1.
The list of Red Hat CVEs, which are patched in this release:
RHSA-2024:4580 Moderate/Sec. cups-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4580 Moderate/Sec. cups-client-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-client-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-client-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4580 Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.4.noarch
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.4.noarch
classification Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.4.noarch
RHSA-2024:4580 Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4580 Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4747 Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.4.noarch
CVE-2024-1298 (RHSA-2024:4747) Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.4.noarch
classification Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.4.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.7.x86_64
classification Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.7.x86_64
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.7.x86_64
RHSA-2024:4746 Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.7.x86_64
classification Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.7.x86_64
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.7.x86_64
RHSA-2024:4746 Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.7.x86_64
classification Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.7.x86_64
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.7.x86_64
RHSA-2024:4746 Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.7.noarch
RHSA-2024:4527 Important/Sec. ghostscript-9.27-6.el8_8.1.x86_64
CVE-2024-33871 (RHSA-2024:4527) Important/Sec. ghostscript-9.27-6.el8_8.1.x86_64
classification Important/Sec. ghostscript-9.27-6.el8_8.1.x86_64
RHSA-2024:4579 Important/Sec. git-2.39.5-1.el8_8.x86_64
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-2.39.5-1.el8_8.x86_64
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-2.39.5-1.el8_8.x86_64
classification Important/Sec. git-2.39.5-1.el8_8.x86_64
RHSA-2024:4579 Important/Sec. git-core-2.39.5-1.el8_8.x86_64
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-core-2.39.5-1.el8_8.x86_64
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-core-2.39.5-1.el8_8.x86_64
classification Important/Sec. git-core-2.39.5-1.el8_8.x86_64
RHSA-2024:4579 Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
classification Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
RHSA-2024:4579 Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
classification Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
RHSA-2024:4719 Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4719 Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
classification Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
RHSA-2024:4719 Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4741 Moderate/Sec. iwl100-firmware-39.31.5.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl100-firmware-39.31.5.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl100-firmware-39.31.5.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl1000-firmware-1:39.31.5.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl1000-firmware-1:39.31.5.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl1000-firmware-1:39.31.5.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl105-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl105-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl105-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl135-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl135-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl135-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl2000-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl2000-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl2000-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl2030-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl2030-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl2030-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl3160-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl3160-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl3160-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl3945-firmware-15.32.2.9-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl3945-firmware-15.32.2.9-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl3945-firmware-15.32.2.9-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl4965-firmware-228.61.2.24-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl4965-firmware-228.61.2.24-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl4965-firmware-228.61.2.24-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl5000-firmware-8.83.5.1_1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl5000-firmware-8.83.5.1_1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl5000-firmware-8.83.5.1_1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl5150-firmware-8.24.2.2-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl5150-firmware-8.24.2.2-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl5150-firmware-8.24.2.2-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6000-firmware-9.221.4.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6000-firmware-9.221.4.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6000-firmware-9.221.4.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6050-firmware-41.28.5.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6050-firmware-41.28.5.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6050-firmware-41.28.5.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl7260-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl7260-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl7260-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
RHSA-2024:4563 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:4563 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4369 Important/Sec. less-530-3.el8_8.x86_64
CVE-2024-32487 (RHSA-2024:4369) Important/Sec. less-530-3.el8_8.x86_64
classification Important/Sec. less-530-3.el8_8.x86_64
RHSA-2024:4527 Important/Sec. libgs-9.27-6.el8_8.1.x86_64
CVE-2024-33871 (RHSA-2024:4527) Important/Sec. libgs-9.27-6.el8_8.1.x86_64
classification Important/Sec. libgs-9.27-6.el8_8.1.x86_64
RHSA-2024:4743 Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4641 Important/Sec. libndp-1.7-7.el8_8.x86_64
CVE-2024-5564 (RHSA-2024:4641) Important/Sec. libndp-1.7-7.el8_8.x86_64
classification Important/Sec. libndp-1.7-7.el8_8.x86_64
RHSA-2024:4741 Moderate/Sec. linux-firmware-20240610-118.1.git90df68d2.el8_8.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. linux-firmware-20240610-118.1.git90df68d2.el8_8.noarch
classification Moderate/Sec. linux-firmware-20240610-118.1.git90df68d2.el8_8.noarch
RHSA-2024:4719 Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4719 Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4740 Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4579 Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
classification Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
RHSA-2024:5000 Important/Sec. platform-python-setuptools-39.2.0-7.el8_8.1.noarch
CVE-2024-6345 (RHSA-2024:6345) Important/Sec. platform-python-setuptools-39.2.0-7.el8_8.1.noarch
classification Important/Sec. platform-python-setuptools-39.2.0-7.el8_8.1.noarch
RHSA-2024:4740 Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:5000 Important/Sec. python3-setuptools-39.2.0-7.el8_8.1.noarch
CVE-2024-6345 (RHSA-2024:5000) Important/Sec. python3-setuptools-39.2.0-7.el8_8.1.noarch
classification Important/Sec. python3-setuptools-39.2.0-7.el8_8.1.noarch
RHSA-2024:5000 Important/Sec. python3-setuptools-wheel-39.2.0-7.el8_8.1.noarch
CVE-2024-6345 (RHSA-2024:5000) Important/Sec. python3-setuptools-wheel-39.2.0-7.el8_8.1.noarch
classification Important/Sec. python3-setuptools-wheel-39.2.0-7.el8_8.1.noarch
RHSA-2024:4372 Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4639 Important/Sec. qt5-qtbase-5.15.3-2.el8_8.x86_64
CVE-2024-39936 (RHSA-2024:4639) Important/Sec. qt5-qtbase-5.15.3-2.el8_8.x86_64
classification Important/Sec. qt5-qtbase-5.15.3-2.el8_8.x86_64
RHSA-2024:4639 Important/Sec. qt5-qtbase-common-5.15.3-2.el8_8.noarch
CVE-2024-39936 (RHSA-2024:4639) Important/Sec. qt5-qtbase-common-5.15.3-2.el8_8.noarch
classification Important/Sec. qt5-qtbase-common-5.15.3-2.el8_8.noarch
RHSA-2024:4639 Important/Sec. qt5-qtbase-gui-5.15.3-2.el8_8.x86_64
CVE-2024-39936 (RHSA-2024:4639) Important/Sec. qt5-qtbase-gui-5.15.3-2.el8_8.x86_64
classification Important/Sec. qt5-qtbase-gui-5.15.3-2.el8_8.x86_64
RHSA-2024:4739 Moderate/Sec. tpm2-tss-2.3.2-5.el8_8.x86_64
CVE-2023-22745 (RHSA-2024:4639) Moderate/Sec. tpm2-tss-2.3.2-5.el8_8.x86_64
classification Moderate/Sec. tpm2-tss-2.3.2-5.el8_8.x86_64

8.8.24.07.SP19

The release date of the 8.8.24.07.SP19 security patch is 22 July 2024. The estimated run time is around 60 minutes.

Restriction: The 8.8.24.07.SP19 security patch is based on RHEL 8.8, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF1.
The list of Red Hat CVEs, which are patched in this release:
RHSA-2024:3811 Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.6.x86_64
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.6.x86_64
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.6.x86_64
RHSA-2024:3811 Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.6.noarch
classification Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.6.x86_64
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.6.x86_64
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.6.x86_64
RHSA-2024:3811 Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.6.x86_64
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.6.x86_64
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.6.x86_64
RHSA-2024:3811 Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.6.noarch
RHSA-2024:3810 Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3701 Moderate/Sec. libnghttp2-1.33.0-5.el8_8.1.x86_64
CVE-2024-28182 (RHSA-2024:3701) Moderate/Sec. libnghttp2-1.33.0-5.el8_8.1.x86_64
classification (RHSA-2024:3701) Moderate/Sec. libnghttp2-1.33.0-5.el8_8.1.x86_64
RHSA-2024:4200 Moderate/Sec. libreswan-4.9-3.el8_8.2.x86_64
CVE-2024-3652 (RHSA-2024:4200) Moderate/Sec. libreswan-4.9-3.el8_8.2.x86_64
classification (RHSA-2024:4200) Moderate/Sec. libreswan-4.9-3.el8_8.2.x86_64
RHSA-2024:3810 Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3812 Moderate/Sec. protobuf-c-1.3.0-8.el8_8.x86_64
CVE-2022-48468 (RHSA-2024:3812) Moderate/Sec. protobuf-c-1.3.0-8.el8_8.x86_64
classification (RHSA-2024:3812) Moderate/Sec. protobuf-c-1.3.0-8.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64

8.8.24.06.SP18

The release date of the 8.8.24.06.SP18 security patch is 17 June 2024. The estimated run time is around 60 minutes.

Restriction: The 8.8.24.06.SP18 security patch is based on RHEL 8.8, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF1.
Note: SP18 does not include new kernel RPMs, so applying SP18 on SP17 will take only 30 minutes. Since the latest kernel is already installed in SP17, no system reboot is required after the NodeOS upgrade.
The list of Red Hat CVEs, which are patched in this release:
RHSA-2024:2721 Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
classification Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
RHSA-2024:2721 Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:3312 Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
classification Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
RHSA-2024:2721 Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:2721 Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
classification Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
RHSA-2024:2721 Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:2721 Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:2721 Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:3312 Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
classification Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
RHSA-2024:3303 Moderate/Sec. libxml2-2.9.7-16.el8_8.4.x86_64
CVE-2024-25062 (RHSA-2024:3303) Moderate/Sec. libxml2-2.9.7-16.el8_8.4.x86_64
classification Moderate/Sec. libxml2-2.9.7-16.el8_8.4.x86_64
RHSA-2024:2891 Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
CVE-2023-45802 (RHSA-2024:2891) Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
CVE-2024-27316 (RHSA-2024:2891) Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
classification Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
RHSA-2024:3312 Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
classification Important/Sec. nscd-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
classification Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
RHSA-2024:3322 Important/Sec. pcp-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-conf-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-conf-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-conf-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-doc-5.3.7-18.el8_8.noarch
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-doc-5.3.7-18.el8_8.noarch
classification Important/Sec. pcp-doc-5.3.7-18.el8_8.noarch
RHSA-2024:3322 Important/Sec. pcp-gui-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-gui-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-gui-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-libs-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-libs-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-libs-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-pmda-dm-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-pmda-dm-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-pmda-dm-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-pmda-nfsclient-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-pmda-nfsclient-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-pmda-nfsclient-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-pmda-openmetrics-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-pmda-openmetrics-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-pmda-openmetrics-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-selinux-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-selinux-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-selinux-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-system-tools-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-system-tools-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-system-tools-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-zeroconf-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-zeroconf-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-zeroconf-5.3.7-18.el8_8.x86_64
RHSA-2024:3391 Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
CVE-2023-6597 (RHSA-2024:3391) Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
CVE-2024-0450 (RHSA-2024:3391) Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
classification Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
RHSA-2024:3391 Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
CVE-2023-6597 (RHSA-2024:3391) Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
CVE-2024-0450 (RHSA-2024:3391) Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
classification Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
RHSA-2024:2721 Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
classification Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
RHSA-2024:3543 Moderate/Sec. python3-idna-2.5-5.el8_8.1.noarch
CVE-2024-3651 (RHSA-2024:3543) Moderate/Sec. python3-idna-2.5-5.el8_8.1.noarch
classification Moderate/Sec. python3-idna-2.5-5.el8_8.1.noarch
RHSA-2024:3391 Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
CVE-2023-6597 (RHSA-2024:3391) Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
CVE-2024-0450 (RHSA-2024:3391) Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
classification Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
RHSA-2024:3303 Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.4.x86_64
CVE-2024-25062 (RHSA-2024:3303) Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.4.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.4.x86_64
RHSA-2024:3322 Important/Sec. python3-pcp-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. python3-pcp-5.3.7-18.el8_8.x86_64
classification Important/Sec. python3-pcp-5.3.7-18.el8_8.x86_64

8.8.24.05.SP17

The release date of the 8.8.24.05.SP17 security patch is 27 May 2024. The estimated run time is around 60 minutes.
Restriction: The 8.8.24.05.SP17 security patch is based on RHEL 8.8, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF1.
The list of Red Hat CVEs, which are patched in this release:
RHSA-2024:2077 Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
classification Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
RHSA-2024:2077 Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2575 Moderate/Sec. expat-2.2.5-11.el8_8.2.x86_64
CVE-2023-52425 (RHSA-2024:2575) Moderate/Sec. expat-2.2.5-11.el8_8.2.x86_64
classification Moderate/Sec. expat-2.2.5-11.el8_8.2.x86_64
RHSA-2024:2077 Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1818 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:1818 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:2621 Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:1875 Moderate/Sec. less-530-2.el8_8.x86_64
CVE-2022-48624 (RHSA-2024:1875) Moderate/Sec. less-530-2.el8_8.x86_64
classification Moderate/Sec. less-530-2.el8_8.x86_64
RHSA-2024:1922 Moderate/Sec. libipa_hbac-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libipa_hbac-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libipa_hbac-2.8.2-4.el8_8.2.x86_64
RHSA-2024:2081 Moderate/Sec. libreswan-4.9-3.el8_8.1.x86_64
CVE-2024-2357 (RHSA-2024:2081) Moderate/Sec. libreswan-4.9-3.el8_8.1.x86_64
classification Moderate/Sec. libreswan-4.9-3.el8_8.1.x86_64
RHSA-2024:2077 Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_autofs-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_autofs-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_autofs-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_certmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_certmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_certmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_simpleifp-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_simpleifp-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_simpleifp-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_sudo-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_sudo-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_sudo-2.8.2-4.el8_8.2.x86_64
RHSA-2024:2621 Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2077 Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1922 Moderate/Sec. python3-libipa_hbac-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-libipa_hbac-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-libipa_hbac-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. python3-libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:2621 Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:1922 Moderate/Sec. python3-sss-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-sss-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-sss-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. python3-sss-murmur-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-sss-murmur-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-sss-murmur-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. python3-sssdconfig-2.8.2-4.el8_8.2.noarch
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-sssdconfig-2.8.2-4.el8_8.2.noarch
classification Moderate/Sec. python3-sssdconfig-2.8.2-4.el8_8.2.noarch
RHSA-2024:1802 Important/Sec. python3-unbound-1.16.2-5.el8_8.4.x86_64
CVE-2024-1488 (RHSA-2024:1802) Important/Sec. python3-unbound-1.16.2-5.el8_8.4.x86_64
classification Important/Sec. python3-unbound-1.16.2-5.el8_8.4.x86_64
RHSA-2024:2077 Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2577 Low/Sec. shadow-utils-2:4.6-17.el8_8.2.x86_64
CVE-2023-4641 (RHSA-2024:2577) Low/Sec. shadow-utils-2:4.6-17.el8_8.2.x86_64
classification Low/Sec. shadow-utils-2:4.6-17.el8_8.2.x86_64
RHSA-2024:2577 Low/Sec. shadow-utils-subid-2:4.6-17.el8_8.2.x86_64
CVE-2023-4641 (RHSA-2024:2577) Low/Sec. shadow-utils-subid-2:4.6-17.el8_8.2.x86_64
classification Low/Sec. shadow-utils-subid-2:4.6-17.el8_8.2.x86_64
RHSA-2024:2077 Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-ad-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-ad-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-ad-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-client-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-client-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-client-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-common-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-common-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-common-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-common-pac-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-common-pac-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-common-pac-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-dbus-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-dbus-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-dbus-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-idp-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-idp-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-idp-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-ipa-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-ipa-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-ipa-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-kcm-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-kcm-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-kcm-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-krb5-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-krb5-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-krb5-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-krb5-common-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-krb5-common-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-krb5-common-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-ldap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-ldap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-ldap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-nfs-idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-nfs-idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-nfs-idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-proxy-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-proxy-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-proxy-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-tools-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-tools-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-tools-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1802 Important/Sec. unbound-libs-1.16.2-5.el8_8.4.x86_64
CVE-2024-1488 (RHSA-2024:1802) Important/Sec. unbound-libs-1.16.2-5.el8_8.4.x86_64
classification Important/Sec. unbound-libs-1.16.2-5.el8_8.4.x86_64
RHSA-2024:2580 Moderate/Sec. yajl-2.1.0-12.el8_8.x86_64
CVE-2023-33460 (RHSA-2024:2580) Moderate/Sec. yajl-2.1.0-12.el8_8.x86_64
classification Moderate/Sec. yajl-2.1.0-12.el8_8.x86_64
RHSA-2024:1406 Moderate/Sec. bind-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-export-libs-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-export-libs-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-export-libs-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-libs-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-libs-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-libs-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-libs-lite-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-libs-lite-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-libs-lite-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-license-32:9.11.36-8.el8_8.3.noarch
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-license-32:9.11.36-8.el8_8.3.noarch
classification Moderate/Sec. bind-license-32:9.11.36-8.el8_8.3.noarch
RHSA-2024:1406 Moderate/Sec. bind-pkcs11-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-pkcs11-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-pkcs11-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-utils-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-utils-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-utils-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
classification Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
RHSA-2024:1409 Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1544 Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
CVE-2023-28450 (RHSA-2024:1544) Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:1544) Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:1544) Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
classification Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
RHSA-2024:1415 Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2019-14560 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2023-3446 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2023-45230 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2023-45234 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
classification Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
RHSA-2024:1408 Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
CVE-2022-48337 (RHSA-2024:1408) Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
CVE-2022-48339 (RHSA-2024:1408) Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
classification Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
RHSA-2024:1412 Moderate/Sec. gmp-1:6.1.2-11.el8_8.1.x86_64
CVE-2021-43618 (RHSA-2024:1412) Moderate/Sec. gmp-1:6.1.2-11.el8_8.1.x86_64
classification Moderate/Sec. gmp-1:6.1.2-11.el8_8.1.x86_64
RHSA-2024:1412 Moderate/Sec. gmp-c++-1:6.1.2-11.el8_8.1.x86_64
CVE-2021-43618 (RHSA-2024:1412) Moderate/Sec. gmp-c++-1:6.1.2-11.el8_8.1.x86_64
classification Moderate/Sec. gmp-c++-1:6.1.2-11.el8_8.1.x86_64
RHSA-2024:1417 Moderate/Sec. libX11-1.6.8-6.el8_8.x86_64
CVE-2023-3138 (RHSA-2024:1417) Moderate/Sec. libX11-1.6.8-6.el8_8.x86_64
classification Moderate/Sec. libX11-1.6.8-6.el8_8.x86_64
RHSA-2024:1417 Moderate/Sec. libX11-common-1.6.8-6.el8_8.noarch
CVE-2023-3138 (RHSA-2024:1417) Moderate/Sec. libX11-common-1.6.8-6.el8_8.noarch
classification Moderate/Sec. libX11-common-1.6.8-6.el8_8.noarch
RHSA-2024:1417 Moderate/Sec. libX11-xcb-1.6.8-6.el8_8.x86_64
CVE-2023-3138 (RHSA-2024:1417) Moderate/Sec. libX11-xcb-1.6.8-6.el8_8.x86_64
classification Moderate/Sec. libX11-xcb-1.6.8-6.el8_8.x86_64
RHSA-2024:1411 Moderate/Sec. opencryptoki-3.19.0-3.el8_8.x86_64
CVE-2024-0914 (RHSA-2024:1411) Moderate/Sec. opencryptoki-3.19.0-3.el8_8.x86_64
classification Moderate/Sec. opencryptoki-3.19.0-3.el8_8.x86_64
RHSA-2024:1411 Moderate/Sec. opencryptoki-libs-3.19.0-3.el8_8.x86_64
CVE-2024-0914 (RHSA-2024:1411) Moderate/Sec. opencryptoki-libs-3.19.0-3.el8_8.x86_64
classification Moderate/Sec. opencryptoki-libs-3.19.0-3.el8_8.x86_64
RHSA-2024:1411 Moderate/Sec. opencryptoki-swtok-3.19.0-3.el8_8.x86_64
CVE-2024-0914 (RHSA-2024:1411) Moderate/Sec. opencryptoki-swtok-3.19.0-3.el8_8.x86_64
classification Moderate/Sec. opencryptoki-swtok-3.19.0-3.el8_8.x86_64
RHSA-2024:1406 Moderate/Sec. python3-bind-32:9.11.36-8.el8_8.3.noarch
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. python3-bind-32:9.11.36-8.el8_8.3.noarch
classification Moderate/Sec. python3-bind-32:9.11.36-8.el8_8.3.noarch

8.8.24.03.SP16

The release date of the 8.8.24.03.SP16 security patch is 8 April 2024. The estimated run time is around 60 minutes.

Restriction: The 8.8.24.03.SP16 security patch is based on RHEL 8.8, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF1.
Note: If the parameter /boot value exceeds 100% capacity after applying the security patch 8.8.24.03.SP16, the following alerts might be displayed:

| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |

Workaround:

  1. Run the following command from all non SPU nodes to check the /boot parameter value:
    df -h /boot
    Example:
    df -h /boot
    Filesystem Size Used Avail Use% Mounted on
    /dev/sda1 190M 177M 0 100% /boot
  2. If the /boot parameter shows use of 95% or greater value, run the following commands on all non SPU nodes to free up storage in /boot.
    1. Run the following command to check which kernel versions are present in each non SPU node:
      
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
      Example:
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    2. Run the following command to find the default kernel version set:
      
      [root@e2n1 ~]# uname -r
      4.18.0-477.55.1.el8_8.x86_64
    3. If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
    4. Check the current kernel installed, as in step 2.a.
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    5. Set the default kernel based on the numbers in the previous steps:
      grub2-set-default 1
    6. Check that the default kernel is correctly set:
      grubby --default-kernel
    7. Run the following commands to reboot the node:
      sudo reboot
      Alternatively, via ipmitool:
      • For Dell system
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power on
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
      • For Lenovo system
        ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on
        ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
    8. After the reboot, run the following command to check the current kernel:
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
    9. Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
      grub2-set-default 1

      Skip the step 3.

  3. Run the following command from all non SPU nodes:
    package-cleanup --oldkernels --count=1
    Note: When the older kernel is removed, the grub2.cfg list (In Step 2.a) will get shuffled. Make sure that the grubenv (Step 2.b) points to the available current version.

    If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.

The list of Red Hat CVEs, which are patched in this release:
RHSA-2024:0576 Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
CVE-2021-3468  (RHSA-2024:0576) Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38469 (RHSA-2024:0576) Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38470 (RHSA-2024:0576) Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38471 (RHSA-2024:0576) Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38472 (RHSA-2024:0576) Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38473 (RHSA-2024:0576) Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
classification Moderate/Sec.  avahi-0.7-20.el8_8.4.x86_64
RHSA-2024:0576 Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2021-3468  (RHSA-2024:0576) Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38469 (RHSA-2024:0576) Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38470 (RHSA-2024:0576) Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38471 (RHSA-2024:0576) Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38472 (RHSA-2024:0576) Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38473 (RHSA-2024:0576) Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
classification Moderate/Sec.  avahi-glib-0.7-20.el8_8.4.x86_64
RHSA-2024:0576 Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2021-3468  (RHSA-2024:0576) Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38469 (RHSA-2024:0576) Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38470 (RHSA-2024:0576) Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38471 (RHSA-2024:0576) Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38472 (RHSA-2024:0576) Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38473 (RHSA-2024:0576) Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
classification Moderate/Sec.  avahi-libs-0.7-20.el8_8.4.x86_64
RHSA-2023:5474 Important/Sec. bind-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-32:9.11.36-8.el8_8.2.x86_64
classification (RHSA-2023:5474) Important/Sec. bind-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-libs-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-libs-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-libs-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-license-32:9.11.36-8.el8_8.2.noarch
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-license-32:9.11.36-8.el8_8.2.noarch
classification Important/Sec. bind-license-32:9.11.36-8.el8_8.2.noarch
RHSA-2023:5474 Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-utils-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. bind-utils-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-utils-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:6236 Moderate/Sec.  binutils-2.30-119.el8_8.2.x86_64
CVE-2022-4285  (RHSA-2023:6236) Moderate/Sec.  binutils-2.30-119.el8_8.2.x86_64
classification Moderate/Sec.  binutils-2.30-119.el8_8.2.x86_64
RHSA-2023:7543 Moderate/Sec.  c-ares-1.13.0-6.el8_8.3.x86_64
CVE-2022-4904  (RHSA-2023:7543) Moderate/Sec.  c-ares-1.13.0-6.el8_8.3.x86_64
CVE-2023-31130 (RHSA-2023:7543) Moderate/Sec.  c-ares-1.13.0-6.el8_8.3.x86_64
classification Moderate/Sec.  c-ares-1.13.0-6.el8_8.3.x86_64
RHSA-2024:0578 Moderate/Sec.  c-ares-1.13.0-6.el8_8.4.x86_64
CVE-2020-22217 (RHSA-2024:0578) Moderate/Sec.  c-ares-1.13.0-6.el8_8.4.x86_64
classification Moderate/Sec.  c-ares-1.13.0-6.el8_8.4.x86_64
RHSA-2023:5455 Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
classification Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
RHSA-2024:0759 Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
classification Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
ref_0          Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
RHSA-2024:0759 Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:4864 Important/Sec. cups-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4864 Important/Sec. cups-client-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-client-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-client-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4864 Important/Sec. cups-filesystem-1:2.2.6-51.el8_8.1.noarch
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-filesystem-1:2.2.6-51.el8_8.1.noarch
classification Important/Sec. cups-filesystem-1:2.2.6-51.el8_8.1.noarch
RHSA-2023:4864 Important/Sec. cups-ipptool-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-ipptool-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-ipptool-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4864 Important/Sec. cups-libs-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-libs-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-libs-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4523 Moderate/Sec.  curl-7.61.1-30.el8_8.3.x86_64
CVE-2023-27536 (RHSA-2023:4864) Moderate/Sec.  curl-7.61.1-30.el8_8.3.x86_64
CVE-2023-28321 (RHSA-2023:4864) Moderate/Sec.  curl-7.61.1-30.el8_8.3.x86_64
classification Moderate/Sec.  curl-7.61.1-30.el8_8.3.x86_64
RHSA-2023:7540 Low/Sec.       curl-7.61.1-30.el8_8.6.x86_64
CVE-2023-38546 (RHSA-2023:7540) Low/Sec.       curl-7.61.1-30.el8_8.6.x86_64
classification Low/Sec.       curl-7.61.1-30.el8_8.6.x86_64
RHSA-2024:0585 Moderate/Sec.  curl-7.61.1-30.el8_8.9.x86_64
RHEL-5674      Moderate/Sec.  curl-7.61.1-30.el8_8.9.x86_64
CVE-2023-28322 (RHSA-2024:0585) Moderate/Sec.  curl-7.61.1-30.el8_8.9.x86_64
CVE-2023-46218 (RHSA-2024:0585) Moderate/Sec.  curl-7.61.1-30.el8_8.9.x86_64
classification Moderate/Sec.  curl-7.61.1-30.el8_8.9.x86_64
RHSA-2023:4498 Moderate/Sec.  dbus-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec.  dbus-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec.  dbus-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec.  dbus-common-1:1.12.8-24.el8_8.1.noarch
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec.  dbus-common-1:1.12.8-24.el8_8.1.noarch
classification Moderate/Sec.  dbus-common-1:1.12.8-24.el8_8.1.noarch
RHSA-2023:4498 Moderate/Sec.  dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec.  dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec.  dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec.  dbus-libs-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec.  dbus-libs-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec.  dbus-libs-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec.  dbus-tools-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec.  dbus-tools-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec.  dbus-tools-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:5252 Moderate/Sec.  dmidecode-1:3.3-4.el8_8.1.x86_64
CVE-2023-30630 (RHSA-2023:5252) Moderate/Sec.  dmidecode-1:3.3-4.el8_8.1.x86_64
classification Moderate/Sec.  dmidecode-1:3.3-4.el8_8.1.x86_64
RHSA-2023:4706 Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
classification Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2023:7528 Moderate/Sec.  fence-agents-all-4.2.1-112.el8_8.2.x86_64
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-all-4.2.1-112.el8_8.2.x86_64
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-all-4.2.1-112.el8_8.2.x86_64
classification Moderate/Sec.  fence-agents-all-4.2.1-112.el8_8.2.x86_64
RHSA-2023:7528 Moderate/Sec.  fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-apc-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-apc-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-apc-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-apc-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-brocade-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-brocade-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-brocade-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-brocade-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-common-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-common-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-common-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-common-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-compute-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-compute-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-compute-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-compute-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-drac5-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-drac5-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-drac5-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-drac5-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-emerson-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-emerson-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-emerson-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-emerson-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-eps-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-eps-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-eps-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-eps-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
classification Moderate/Sec.  fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
RHSA-2023:7528 Moderate/Sec.  fence-agents-mpath-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-mpath-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-mpath-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-mpath-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
classification Moderate/Sec.  fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
RHSA-2023:7528 Moderate/Sec.  fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-rsa-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-rsa-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-rsa-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-rsa-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-rsb-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-rsb-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-rsb-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-rsb-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-sbd-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-sbd-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-sbd-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-sbd-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-scsi-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-scsi-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-scsi-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-scsi-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec.  fence-agents-wti-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec.  fence-agents-wti-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec.  fence-agents-wti-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec.  fence-agents-wti-4.2.1-112.el8_8.2.noarch
RHSA-2023:5046 Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
CVE-2020-22219 (RHSA-2023:5046) Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
classification Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
RHSA-2023:5219 Important/Sec. frr-7.5.1-7.el8_8.2.x86_64
CVE-2023-38802 (RHSA-2023:5219) Important/Sec. frr-7.5.1-7.el8_8.2.x86_64
classification Important/Sec. frr-7.5.1-7.el8_8.2.x86_64
RHSA-2024:0574 Moderate/Sec.  frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-38406 (RHSA-2024:0574) Moderate/Sec.  frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-38407 (RHSA-2024:0574) Moderate/Sec.  frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-47234 (RHSA-2024:0574) Moderate/Sec.  frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-47235 (RHSA-2024:0574) Moderate/Sec.  frr-7.5.1-7.el8_8.5.x86_64
classification Moderate/Sec.  frr-7.5.1-7.el8_8.5.x86_64
RHSA-2023:5219 Important/Sec. frr-selinux-7.5.1-7.el8_8.2.noarch
CVE-2023-38802 (RHSA-2023:5219) Important/Sec. frr-selinux-7.5.1-7.el8_8.2.noarch
classification Important/Sec. frr-selinux-7.5.1-7.el8_8.2.noarch
RHSA-2024:0574 Moderate/Sec.  frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-38406 (RHSA-2024:0574) Moderate/Sec.  frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-38407 (RHSA-2024:0574) Moderate/Sec.  frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-47234 (RHSA-2024:0574) Moderate/Sec.  frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-47235 (RHSA-2024:0574) Moderate/Sec.  frr-selinux-7.5.1-7.el8_8.5.noarch
classification Moderate/Sec.  frr-selinux-7.5.1-7.el8_8.5.noarch
RHSA-2024:0759 Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:5455 Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
RHSA-2024:0399 Moderate/Sec.  gnutls-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981  (RHSA-2024:0399) Moderate/Sec.  gnutls-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec.  gnutls-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec.  gnutls-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553  (RHSA-2024:0796) Moderate/Sec.  gnutls-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec.  gnutls-3.6.16-7.el8_8.2.x86_64
RHSA-2024:0399 Moderate/Sec.  gnutls-c++-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981  (RHSA-2024:0399) Moderate/Sec.  gnutls-c++-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec.  gnutls-c++-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec.  gnutls-c++-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553  (RHSA-2024:0796) Moderate/Sec.  gnutls-c++-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec.  gnutls-c++-3.6.16-7.el8_8.2.x86_64
RHSA-2024:0399 Moderate/Sec.  gnutls-dane-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981  (RHSA-2024:0399) Moderate/Sec.  gnutls-dane-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec.  gnutls-dane-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec.  gnutls-dane-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553  (RHSA-2024:0796) Moderate/Sec.  gnutls-dane-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec.  gnutls-dane-3.6.16-7.el8_8.2.x86_64
RHSA-2024:0399 Moderate/Sec.  gnutls-utils-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981  (RHSA-2024:0399) Moderate/Sec.  gnutls-utils-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec.  gnutls-utils-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec.  gnutls-utils-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553  (RHSA-2024:0796) Moderate/Sec.  gnutls-utils-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec.  gnutls-utils-3.6.16-7.el8_8.2.x86_64
RHSA-2023:5050 Moderate/Sec.  httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec.  httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec.  httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:5050 Moderate/Sec.  httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7.noarch
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec.  httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7.noarch
classification Moderate/Sec.  httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7.noarch
RHSA-2023:5050 Moderate/Sec.  httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec.  httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec.  httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:4570 Important/Sec. iperf3-3.5-7.el8_8.x86_64
CVE-2023-38403 (RHSA-2023:4570) Important/Sec. iperf3-3.5-7.el8_8.x86_64
classification Important/Sec. iperf3-3.5-7.el8_8.x86_64
RHSA-2023:5245 Moderate/Sec.  iwl100-firmware-39.31.5.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl100-firmware-39.31.5.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl100-firmware-39.31.5.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl100-firmware-39.31.5.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl100-firmware-39.31.5.1-118.el8_8.1.noarch
classification Important/Sec. iwl100-firmware-39.31.5.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl1000-firmware-1:39.31.5.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl1000-firmware-1:39.31.5.1-118.el8_8.1.noarch
classification Important/Sec. iwl1000-firmware-1:39.31.5.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl105-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl105-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl105-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl105-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl105-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl105-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl135-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl135-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl135-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl135-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl135-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl135-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl2000-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl2000-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl2000-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl2000-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl2000-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl2000-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl2030-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl2030-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl2030-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl2030-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl2030-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl2030-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-117.el8_8.1.noarch
classification Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl3160-firmware-1:25.30.13.0-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl3160-firmware-1:25.30.13.0-118.el8_8.1.noarch
classification Important/Sec. iwl3160-firmware-1:25.30.13.0-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl3945-firmware-15.32.2.9-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl3945-firmware-15.32.2.9-117.el8_8.1.noarch
classification Moderate/Sec.  iwl3945-firmware-15.32.2.9-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl3945-firmware-15.32.2.9-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl3945-firmware-15.32.2.9-118.el8_8.1.noarch
classification Important/Sec. iwl3945-firmware-15.32.2.9-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl4965-firmware-228.61.2.24-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl4965-firmware-228.61.2.24-117.el8_8.1.noarch
classification Moderate/Sec.  iwl4965-firmware-228.61.2.24-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl4965-firmware-228.61.2.24-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl4965-firmware-228.61.2.24-118.el8_8.1.noarch
classification Important/Sec. iwl4965-firmware-228.61.2.24-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl5000-firmware-8.83.5.1_1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl5000-firmware-8.83.5.1_1-118.el8_8.1.noarch
classification Important/Sec. iwl5000-firmware-8.83.5.1_1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl5150-firmware-8.24.2.2-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl5150-firmware-8.24.2.2-117.el8_8.1.noarch
classification Moderate/Sec.  iwl5150-firmware-8.24.2.2-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl5150-firmware-8.24.2.2-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl5150-firmware-8.24.2.2-118.el8_8.1.noarch
classification Important/Sec. iwl5150-firmware-8.24.2.2-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl6000-firmware-9.221.4.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl6000-firmware-9.221.4.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl6000-firmware-9.221.4.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6000-firmware-9.221.4.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6000-firmware-9.221.4.1-118.el8_8.1.noarch
classification Important/Sec. iwl6000-firmware-9.221.4.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6000g2a-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6000g2a-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl6000g2a-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6000g2b-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6000g2b-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl6000g2b-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl6050-firmware-41.28.5.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl6050-firmware-41.28.5.1-117.el8_8.1.noarch
classification Moderate/Sec.  iwl6050-firmware-41.28.5.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6050-firmware-41.28.5.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6050-firmware-41.28.5.1-118.el8_8.1.noarch
classification Important/Sec. iwl6050-firmware-41.28.5.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-117.el8_8.1.noarch
classification Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl7260-firmware-1:25.30.13.0-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl7260-firmware-1:25.30.13.0-118.el8_8.1.noarch
classification Important/Sec. iwl7260-firmware-1:25.30.13.0-118.el8_8.1.noarch
RHSA-2023:4176 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045 (RHSA-2023:4176) Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049 (RHSA-2023:4176) Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
classification Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433 (RHSA-2023:5731) Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067 (RHSA-2023:5731) Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081 (RHSA-2023:5731) Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
classification Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2023:4176 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045 (RHSA-2023:4176) Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049 (RHSA-2023:4176) Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
classification Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433 (RHSA-2023:5731) Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067 (RHSA-2023:5731) Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081 (RHSA-2023:5731) Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
classification Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2023:4517 Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 (RHSA-2022:6460) Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 (RHSA-2022:6460) Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 (RHSA-2022:6460) Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-28693 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
RHSA-2023:0101 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-2964  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-4139  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
RHSA-2023:0832 Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-2873  (RHSA-2023:0832) Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-41222 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-43945 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
RHSA-2023:1566 Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4269  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4378  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0266  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0386  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
RHSA-2022:7683 Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
classification Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
ref_0          Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
ref_1          Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2020-36516 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2020-36558 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2021-3640  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2021-30002 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-0168  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-0617  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-0854  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1016  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1048  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1055  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1158  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1184  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1263  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1280  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1852  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2078  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2153  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2503  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2586  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2639  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2938  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-3107  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-20368 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-20572 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-21499 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-23960 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-24448 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-26373 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-27950 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-28390 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-28893 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-29581 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-36946 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
RHSA-2023:2951 Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
ref_0          Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-26341 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33655 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33656 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1462  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1679  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1789  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2196  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2663  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3028  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3239  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3522  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3524  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3564  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3566  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3567  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3619  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3623  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3625  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3628  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3707  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4129  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4662  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-20141 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-25265 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-30594 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-36879 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39188 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39189 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41218 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41674 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42703 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42720 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42721 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42722 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-43750 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-47929 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0394  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0461  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1095  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1195  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1582  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-2177  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-22998 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-23454 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
RHSA-2023:3349 Important/Sec. kernel-debuginfo-4.18.0-477.13.1.el8_8.x86_64
CVE-2023-32233 (RHSA-2023:3349) Important/Sec. kernel-debuginfo-4.18.0-477.13.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.13.1.el8_8.x86_64
RHSA-2023:3847 Moderate/Sec.  kernel-debuginfo-4.18.0-477.15.1.el8_8.x86_64
CVE-2023-28466 (RHSA-2023:3847) Moderate/Sec.  kernel-debuginfo-4.18.0-477.15.1.el8_8.x86_64
classification Moderate/Sec.  kernel-debuginfo-4.18.0-477.15.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 (RHSA-2022:6460) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 (RHSA-2022:6460) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 (RHSA-2022:6460) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-28693 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
RHSA-2023:0101 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-2964  (RHSA-2023:0101) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-4139  (RHSA-2023:0101) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
RHSA-2023:0832 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-2873  (RHSA-2023:0832) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-41222 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-43945 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
RHSA-2023:1566 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4269  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4378  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0266  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0386  (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
RHSA-2022:7683 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
classification Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
ref_0          Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
ref_1          Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2020-36516 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2020-36558 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2021-3640  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2021-30002 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-0168  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-0617  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-0854  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1016  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1048  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1055  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1158  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1184  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1263  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1280  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1852  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2078  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2153  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2503  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2586  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2639  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2938  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-3107  (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-20368 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-20572 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-21499 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-23960 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-24448 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-26373 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-27950 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-28390 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-28893 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-29581 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-36946 (RHSA-2022:7683) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
RHSA-2023:2951 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
ref_0          Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-26341 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33655 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33656 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1462  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1679  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1789  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2196  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2663  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3028  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3239  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3522  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3524  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3564  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3566  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3567  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3619  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3623  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3625  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3628  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3707  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4129  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4662  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-20141 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-25265 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-30594 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-36879 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39188 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39189 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41218 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41674 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42703 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42720 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42721 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42722 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-43750 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-47929 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0394  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0461  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1095  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1195  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1582  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-2177  (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-22998 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-23454 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
RHSA-2023:3349 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.13.1.el8_8.x86_64
CVE-2023-32233 (RHSA-2023:3349) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.13.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.13.1.el8_8.x86_64
RHSA-2023:3847 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64
CVE-2023-28466 (RHSA-2023:3847) Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64
classification Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:057) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4524 Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
CVE-2023-2602  (RHSA-2023:4524) Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
CVE-2023-2603  (RHSA-2023:4524) Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
classification Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
RHSA-2023:4523 (RHSA-2023:4523) Moderate/Sec.  libcurl-7.61.1-30.el8_8.3.x86_64
CVE-2023-27536 (RHSA-2023:4523) Moderate/Sec.  libcurl-7.61.1-30.el8_8.3.x86_64
CVE-2023-28321 Moderate/Sec.  libcurl-7.61.1-30.el8_8.3.x86_64
classification Moderate/Sec.  libcurl-7.61.1-30.el8_8.3.x86_64
RHSA-2023:7540 Low/Sec.       libcurl-7.61.1-30.el8_8.6.x86_64
CVE-2023-38546 (RHSA-2023:7540) Low/Sec.       libcurl-7.61.1-30.el8_8.6.x86_64
classification Low/Sec.       libcurl-7.61.1-30.el8_8.6.x86_64
RHSA-2024:0585 Moderate/Sec.  libcurl-7.61.1-30.el8_8.9.x86_64
RHEL-5674      Moderate/Sec.  libcurl-7.61.1-30.el8_8.9.x86_64
CVE-2023-28322 (RHSA-2024:0585) Moderate/Sec.  libcurl-7.61.1-30.el8_8.9.x86_64
CVE-2023-46218 (RHSA-2024:0585) Moderate/Sec.  libcurl-7.61.1-30.el8_8.9.x86_64
classification Moderate/Sec.  libcurl-7.61.1-30.el8_8.9.x86_64
RHSA-2024:0573 Moderate/Sec.  libfastjson-0.99.9-1.el8_8.1.x86_64
CVE-2020-12762 (RHSA-2024:0573) Moderate/Sec.  libfastjson-0.99.9-1.el8_8.1.x86_64
classification Moderate/Sec.  libfastjson-0.99.9-1.el8_8.1.x86_64
RHSA-2024:0750 Moderate/Sec.  libmaxminddb-1.2.0-10.el8_8.1.x86_64
CVE-2020-28241 (RHSA-2024:0750) Moderate/Sec.  libmaxminddb-1.2.0-10.el8_8.1.x86_64
classification Moderate/Sec.  libmaxminddb-1.2.0-10.el8_8.1.x86_64
RHSA-2023:4328 Moderate/Sec.  libnetapi-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  libnetapi-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  libnetapi-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  libnetapi-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  libnetapi-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  libnetapi-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  libnetapi-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  libnetapi-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  libnetapi-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  libnetapi-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  libnetapi-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  libnetapi-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  libnetapi-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  libnetapi-4.17.5-5.el8_8.x86_64
RHSA-2023:5837 Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
CVE-2023-44487 (RHSA-2023:5837) Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
classification Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
ref_0          Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
RHSA-2023:5455 Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
classification Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
RHSA-2024:0759 Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:4328 Moderate/Sec.  libsmbclient-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  libsmbclient-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  libsmbclient-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  libsmbclient-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  libsmbclient-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  libsmbclient-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  libsmbclient-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  libsmbclient-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  libsmbclient-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  libsmbclient-4.17.5-5.el8_8.x86_64
RHSA-2024:0625 Moderate/Sec.  libssh-0.9.6-13.el8_8.x86_64
CVE-2023-48795 (RHSA-2024:0625) Moderate/Sec.  libssh-0.9.6-13.el8_8.x86_64
classification Moderate/Sec.  libssh-0.9.6-13.el8_8.x86_64
RHSA-2024:0625 Moderate/Sec.  libssh-config-0.9.6-13.el8_8.noarch
CVE-2023-48795 (RHSA-2024:0625) Moderate/Sec.  libssh-config-0.9.6-13.el8_8.noarch
classification Moderate/Sec.  libssh-config-0.9.6-13.el8_8.noarch
RHSA-2023:5353 Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0800  (RHSA-2023:5353) Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0801  (RHSA-2023:5353) Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0802  (RHSA-2023:5353) Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0803  (RHSA-2023:5353) Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0804  (RHSA-2023:5353) Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
classification Moderate/Sec.  libtiff-4.0.9-29.el8_8.x86_64
RHSA-2023:5537 Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
CVE-2023-5217  (RHSA-2023:5537) Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
CVE-2023-44488 (RHSA-2023:5537) Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
classification Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  libwbclient-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  libwbclient-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  libwbclient-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  libwbclient-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  libwbclient-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  libwbclient-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  libwbclient-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  libwbclient-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  libwbclient-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  libwbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  libwbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  libwbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  libwbclient-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  libwbclient-4.17.5-5.el8_8.x86_64
RHSA-2023:5309 Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
classification Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-4863  (RHSA-2023:5309) Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-5129  (RHSA-2023:5309) Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
RHSA-2023:4529 Moderate/Sec.  libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-28484 (RHSA-2023:4529) Moderate/Sec.  libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-29469 (RHSA-2023:4529) Moderate/Sec.  libxml2-2.9.7-16.el8_8.1.x86_64
classification Moderate/Sec.  libxml2-2.9.7-16.el8_8.1.x86_64
RHSA-2023:7544 Moderate/Sec.  libxml2-2.9.7-16.el8_8.2.x86_64
CVE-2023-39615 (RHSA-2023:7544) Moderate/Sec.  libxml2-2.9.7-16.el8_8.2.x86_64
classification Moderate/Sec.  libxml2-2.9.7-16.el8_8.2.x86_64
RHSA-2023:5245 Moderate/Sec.  linux-firmware-20230404-117.git2e92a49f.el8_8.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec.  linux-firmware-20230404-117.git2e92a49f.el8_8.noarch
classification Moderate/Sec.  linux-firmware-20230404-117.git2e92a49f.el8_8.noarch
RHSA-2024:0577 Important/Sec. linux-firmware-20230404-118.git2e92a49f.el8_8.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. linux-firmware-20230404-118.git2e92a49f.el8_8.noarch
classification Important/Sec. linux-firmware-20230404-118.git2e92a49f.el8_8.noarch
RHSA-2023:5259 Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084 (RHSA-2023:5259) Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091 (RHSA-2023:5259) Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791 (RHSA-2023:5259) Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015 (RHSA-2023:5259) Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5259 Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084 (RHSA-2023:5259) Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091 (RHSA-2023:5259) Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791 (RHSA-2023:5259) Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015 (RHSA-2023:5259) Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5050 Moderate/Sec.  mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec.  mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec.  mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:5050 Moderate/Sec.  mod_ssl-1:2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec.  mod_ssl-1:2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec.  mod_ssl-1:2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:5249 Moderate/Sec.  ncurses-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec.  ncurses-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec.  ncurses-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_8.1.noarch
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_8.1.noarch
classification Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_8.1.noarch
RHSA-2023:5249 Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5455 Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
classification Important/Sec. nscd-2.28-225.el8_8.6.x86_64
RHSA-2024:0093 Moderate/Sec.  nss-3.90.0-4.el8_8.x86_64
CVE-2023-5388  (RHSA-2024:0093) Moderate/Sec.  nss-3.90.0-4.el8_8.x86_64
classification Moderate/Sec.  nss-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec.  nss-3.90.0-6.el8_8.x86_64
CVE-2023-6135  (RHSA-2024:0785) Moderate/Sec.  nss-3.90.0-6.el8_8.x86_64
classification Moderate/Sec.  nss-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec.  nss-softokn-3.90.0-4.el8_8.x86_64
CVE-2023-5388  (RHSA-2024:0093) Moderate/Sec.  nss-softokn-3.90.0-4.el8_8.x86_64
classification Moderate/Sec.  nss-softokn-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec.  nss-softokn-3.90.0-6.el8_8.x86_64
CVE-2023-6135  (RHSA-2024:0785) Moderate/Sec.  nss-softokn-3.90.0-6.el8_8.x86_64
classification Moderate/Sec.  nss-softokn-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec.  nss-softokn-freebl-3.90.0-4.el8_8.x86_64
CVE-2023-5388  (RHSA-2024:0093) Moderate/Sec.  nss-softokn-freebl-3.90.0-4.el8_8.x86_64
classification Moderate/Sec.  nss-softokn-freebl-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec.  nss-softokn-freebl-3.90.0-6.el8_8.x86_64
CVE-2023-6135  (RHSA-2024:0785) Moderate/Sec.  nss-softokn-freebl-3.90.0-6.el8_8.x86_64
classification Moderate/Sec.  nss-softokn-freebl-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec.  nss-sysinit-3.90.0-4.el8_8.x86_64
CVE-2023-5388  (RHSA-2024:0093) Moderate/Sec.  nss-sysinit-3.90.0-4.el8_8.x86_64
classification Moderate/Sec.  nss-sysinit-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec.  nss-sysinit-3.90.0-6.el8_8.x86_64
CVE-2023-6135  (RHSA-2024:0785) Moderate/Sec.  nss-sysinit-3.90.0-6.el8_8.x86_64
classification Moderate/Sec.  nss-sysinit-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec.  nss-tools-3.90.0-4.el8_8.x86_64
CVE-2023-5388  (RHSA-2024:0093) Moderate/Sec.  nss-tools-3.90.0-4.el8_8.x86_64
classification Moderate/Sec.  nss-tools-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec.  nss-tools-3.90.0-6.el8_8.x86_64
CVE-2023-6135  (RHSA-2024:0785) Moderate/Sec.  nss-tools-3.90.0-6.el8_8.x86_64
classification Moderate/Sec.  nss-tools-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec.  nss-util-3.90.0-4.el8_8.x86_64
CVE-2023-5388  (RHSA-2024:0093) Moderate/Sec.  nss-util-3.90.0-4.el8_8.x86_64
classification Moderate/Sec.  nss-util-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec.  nss-util-3.90.0-6.el8_8.x86_64
CVE-2023-6135  (RHSA-2024:0785) Moderate/Sec.  nss-util-3.90.0-6.el8_8.x86_64
classification Moderate/Sec.  nss-util-3.90.0-6.el8_8.x86_64
RHSA-2023:5455 Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4527  (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4806  (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4813  (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4911  (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
classification Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
RHSA-2024:0572 Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-13224 (RHSA-2024:0572) Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-16163 (RHSA-2024:0572) Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-19012 (RHSA-2024:0572) Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-19203 (RHSA-2024:0572) Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-19204 (RHSA-2024:0572) Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
classification Moderate/Sec.  oniguruma-6.8.2-2.1.el8_8.x86_64
RHSA-2024:0594 Moderate/Sec.  openssh-8.0p1-19.el8_8.2.x86_64
CVE-2023-48795 (RHSA-2024:0594) Moderate/Sec.  openssh-8.0p1-19.el8_8.2.x86_64
CVE-2023-51385 (RHSA-2024:0594) Moderate/Sec.  openssh-8.0p1-19.el8_8.2.x86_64
classification Moderate/Sec.  openssh-8.0p1-19.el8_8.2.x86_64
RHSA-2023:4419 Important/Sec. openssh-8.0p1-19.el8_8.x86_64
CVE-2023-38408 (RHSA-2023:4419) Important/Sec. openssh-8.0p1-19.el8_8.x86_64
classification Important/Sec. openssh-8.0p1-19.el8_8.x86_64
RHSA-2024:0594 Moderate/Sec.  openssh-clients-8.0p1-19.el8_8.2.x86_64
CVE-2023-48795 (RHSA-2024:0594) Moderate/Sec.  openssh-clients-8.0p1-19.el8_8.2.x86_64
CVE-2023-51385 (RHSA-2024:0594) Moderate/Sec.  openssh-clients-8.0p1-19.el8_8.2.x86_64
classification Moderate/Sec.  openssh-clients-8.0p1-19.el8_8.2.x86_64
RHSA-2023:4419 Important/Sec. openssh-clients-8.0p1-19.el8_8.x86_64
CVE-2023-38408 (RHSA-2023:4419) Important/Sec. openssh-clients-8.0p1-19.el8_8.x86_64
classification Important/Sec. openssh-clients-8.0p1-19.el8_8.x86_64
RHSA-2024:0594 Moderate/Sec.  openssh-server-8.0p1-19.el8_8.2.x86_64
CVE-2023-48795 (RHSA-2024:0594) Moderate/Sec.  openssh-server-8.0p1-19.el8_8.2.x86_64
CVE-2023-51385 (RHSA-2024:0594) Moderate/Sec.  openssh-server-8.0p1-19.el8_8.2.x86_64
classification Moderate/Sec.  openssh-server-8.0p1-19.el8_8.2.x86_64
RHSA-2023:4419 Important/Sec. openssh-server-8.0p1-19.el8_8.x86_64
CVE-2023-38408 (RHSA-2023:4419) Important/Sec. openssh-server-8.0p1-19.el8_8.x86_64
classification Important/Sec. openssh-server-8.0p1-19.el8_8.x86_64
RHSA-2024:0154 Low/Sec.       openssl-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3446  (RHSA-2024:0154) Low/Sec.       openssl-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3817  (RHSA-2024:0154) Low/Sec.       openssl-1:1.1.1k-12.el8_8.x86_64
CVE-2023-5678  (RHSA-2024:0154) Low/Sec.       openssl-1:1.1.1k-12.el8_8.x86_64
classification Low/Sec.       openssl-1:1.1.1k-12.el8_8.x86_64
RHSA-2024:0154 Low/Sec.       openssl-devel-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3446  (RHSA-2024:0154) Low/Sec.       openssl-devel-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3817  (RHSA-2024:0154) Low/Sec.       openssl-devel-1:1.1.1k-12.el8_8.x86_64
CVE-2023-5678  (RHSA-2024:0154) Low/Sec.       openssl-devel-1:1.1.1k-12.el8_8.x86_64
classification Low/Sec.       openssl-devel-1:1.1.1k-12.el8_8.x86_64
RHSA-2024:0154 Low/Sec.       openssl-libs-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3446  (RHSA-2024:0154) Low/Sec.       openssl-libs-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3817  (RHSA-2024:0154) Low/Sec.       openssl-libs-1:1.1.1k-12.el8_8.x86_64
CVE-2023-5678  (RHSA-2024:0154) Low/Sec.       openssl-libs-1:1.1.1k-12.el8_8.x86_64
classification Low/Sec.       openssl-libs-1:1.1.1k-12.el8_8.x86_64
RHSA-2023:4517 Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
classification (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
RHSA-2024:0579 Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
RHEL-21762     Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
CVE-2023-31486 (RHSA-2024:0579) Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
classification Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
RHSA-2023:7531 Moderate/Sec.  pixman-0.38.4-3.el8_8.x86_64
CVE-2022-44638 (RHSA-2023:7531) Moderate/Sec.  pixman-0.38.4-3.el8_8.x86_64
classification Moderate/Sec.  pixman-0.38.4-3.el8_8.x86_64
RHSA-2023:5997 Important/Sec. platform-python-3.6.8-51.el8_8.2.x86_64
CVE-2023-40217 (RHSA-2023:5997) Important/Sec. platform-python-3.6.8-51.el8_8.2.x86_64
classification Important/Sec. platform-python-3.6.8-51.el8_8.2.x86_64
RHSA-2024:0586 Moderate/Sec.  platform-python-3.6.8-51.el8_8.4.x86_64
CVE-2022-48560 (RHSA-2024:0586) Moderate/Sec.  platform-python-3.6.8-51.el8_8.4.x86_64
CVE-2022-48564 (RHSA-2024:0586) Moderate/Sec.  platform-python-3.6.8-51.el8_8.4.x86_64
CVE-2023-27043 (RHSA-2024:0586) Moderate/Sec.  platform-python-3.6.8-51.el8_8.4.x86_64
classification Moderate/Sec.  platform-python-3.6.8-51.el8_8.4.x86_64
RHSA-2023:5997 Important/Sec. platform-python-devel-3.6.8-51.el8_8.2.x86_64
CVE-2023-40217 (RHSA-2023:5997) Important/Sec. platform-python-devel-3.6.8-51.el8_8.2.x86_64
classification Important/Sec. platform-python-devel-3.6.8-51.el8_8.2.x86_64
RHSA-2024:0586 Moderate/Sec.  platform-python-devel-3.6.8-51.el8_8.4.x86_64
CVE-2022-48560 (RHSA-2024:0586) Moderate/Sec.  platform-python-devel-3.6.8-51.el8_8.4.x86_64
CVE-2022-48564 (RHSA-2024:0586) Moderate/Sec.  platform-python-devel-3.6.8-51.el8_8.4.x86_64
CVE-2023-27043 (RHSA-2024:0586) Moderate/Sec.  platform-python-devel-3.6.8-51.el8_8.4.x86_64
classification Moderate/Sec.  platform-python-devel-3.6.8-51.el8_8.4.x86_64
RHSA-2024:0587 Moderate/Sec.  platform-python-pip-9.0.3-22.1.el8_8.noarch
CVE-2007-4559  (RHSA-2024:0587) Moderate/Sec.  platform-python-pip-9.0.3-22.1.el8_8.noarch
classification Moderate/Sec.  platform-python-pip-9.0.3-22.1.el8_8.noarch
RHSA-2024:0759 Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0862 Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
CVE-2023-44442 (RHSA-2024:0862) Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
CVE-2023-44444 (RHSA-2024:0862) Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
classification Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
RHSA-2023:5994 Important/Sec. python2-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
CVE-2023-40217 (RHSA-2023:5994) Important/Sec. python2-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
classification Important/Sec. python2-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
RHSA-2023:5994 Important/Sec. python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
CVE-2023-40217 (RHSA-2023:5994) Important/Sec. python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
classification Important/Sec. python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
RHSA-2023:5994 Important/Sec. python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
CVE-2023-40217 (RHSA-2023:5994) Important/Sec. python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
classification Important/Sec. python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
RHSA-2023:5474 Important/Sec. python3-bind-32:9.11.36-8.el8_8.2.noarch
CVE-2023-3341  (RHSA-2023:5474) Important/Sec. python3-bind-32:9.11.36-8.el8_8.2.noarch
classification Important/Sec. python3-bind-32:9.11.36-8.el8_8.2.noarch
RHSA-2023:4706 Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
RHSA-2023:5997 Important/Sec. python3-libs-3.6.8-51.el8_8.2.x86_64
CVE-2023-40217 (RHSA-2023:5997) Important/Sec. python3-libs-3.6.8-51.el8_8.2.x86_64
classification Important/Sec. python3-libs-3.6.8-51.el8_8.2.x86_64
RHSA-2024:0586 Moderate/Sec.  python3-libs-3.6.8-51.el8_8.4.x86_64
CVE-2022-48560 (RHSA-2024:0586) Moderate/Sec.  python3-libs-3.6.8-51.el8_8.4.x86_64
CVE-2022-48564 (RHSA-2024:0586) Moderate/Sec.  python3-libs-3.6.8-51.el8_8.4.x86_64
CVE-2023-27043 (RHSA-2024:0586) Moderate/Sec.  python3-libs-3.6.8-51.el8_8.4.x86_64
classification Moderate/Sec.  python3-libs-3.6.8-51.el8_8.4.x86_64
RHSA-2023:4529 Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-28484 (RHSA-2023:4529) Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-29469 (RHSA-2023:4529) Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.1.x86_64
classification Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.1.x86_64
RHSA-2023:7544 Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.2.x86_64
CVE-2023-39615 (RHSA-2023:7544) Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.2.x86_64
classification Moderate/Sec.  python3-libxml2-2.9.7-16.el8_8.2.x86_64
RHSA-2023:4517 Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281  (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829  (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124  (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194  (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235  (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637  (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002  (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090  (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390  (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776  (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004  (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732  (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
ref_0          Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717  (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
RHSA-2024:0754 Important/Sec. python3-pillow-5.1.1-19.el8_8.x86_64
CVE-2023-50447 (RHSA-2024:0754) Important/Sec. python3-pillow-5.1.1-19.el8_8.x86_64
classification Important/Sec. python3-pillow-5.1.1-19.el8_8.x86_64
RHSA-2024:0587 Moderate/Sec.  python3-pip-9.0.3-22.1.el8_8.noarch
CVE-2007-4559  (RHSA-2024:0587) Moderate/Sec.  python3-pip-9.0.3-22.1.el8_8.noarch
classification Moderate/Sec.  python3-pip-9.0.3-22.1.el8_8.noarch
RHSA-2024:0587 Moderate/Sec.  python3-pip-wheel-9.0.3-22.1.el8_8.noarch
CVE-2007-4559  (RHSA-2024:0587) Moderate/Sec.  python3-pip-wheel-9.0.3-22.1.el8_8.noarch
classification Moderate/Sec.  python3-pip-wheel-9.0.3-22.1.el8_8.noarch
RHSA-2023:4520 Moderate/Sec.  python3-requests-2.20.0-3.el8_8.noarch
CVE-2023-32681 (RHSA-2023:4520) Moderate/Sec.  python3-requests-2.20.0-3.el8_8.noarch
classification Moderate/Sec.  python3-requests-2.20.0-3.el8_8.noarch
RHSA-2024:0582 Moderate/Sec.  python3-rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  python3-rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  python3-rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  python3-rpm-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  python3-rpm-4.14.3-28.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  python3-samba-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  python3-samba-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  python3-samba-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  python3-samba-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  python3-samba-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  python3-samba-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  python3-samba-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  python3-samba-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  python3-samba-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  python3-samba-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  python3-samba-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  python3-samba-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  python3-samba-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  python3-samba-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  python3-samba-dc-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  python3-samba-dc-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  python3-samba-dc-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  python3-samba-dc-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  python3-samba-dc-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  python3-samba-dc-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  python3-samba-dc-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  python3-samba-dc-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  python3-samba-dc-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  python3-samba-dc-4.17.5-5.el8_8.x86_64
RHSA-2023:4706 Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
RHSA-2023:4706 Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
RHSA-2024:0982 Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:0982) Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:0982) Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
classification Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
RHSA-2024:0588 Moderate/Sec.  python3-urllib3-1.24.2-5.el8_8.1.noarch
CVE-2023-43804 (RHSA-2024:0588) Moderate/Sec.  python3-urllib3-1.24.2-5.el8_8.1.noarch
CVE-2023-45803 (RHSA-2024:0588) Moderate/Sec.  python3-urllib3-1.24.2-5.el8_8.1.noarch
classification Moderate/Sec.  python3-urllib3-1.24.2-5.el8_8.1.noarch
RHSA-2023:5264 Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:4706 Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
classification Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
RHSA-2024:0582 Moderate/Sec.  rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec.  rpm-build-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-build-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-build-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-build-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-build-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec.  rpm-build-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-build-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-build-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-build-libs-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-build-libs-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec.  rpm-devel-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-devel-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-devel-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-devel-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-devel-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec.  rpm-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-libs-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-libs-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec.  rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
classification Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
RHSA-2024:0759 Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-client-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-client-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-client-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-client-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-client-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-client-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-client-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-client-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-client-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-client-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-client-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-client-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-client-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-client-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-client-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-client-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-client-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-client-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-client-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-client-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-client-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-client-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-client-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-client-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-common-4.17.5-3.el8_8.noarch
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-common-4.17.5-3.el8_8.noarch
classification Moderate/Sec.  samba-common-4.17.5-3.el8_8.noarch
RHSA-2023:7464 Moderate/Sec.  samba-common-4.17.5-4.el8_8.noarch
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-common-4.17.5-4.el8_8.noarch
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-common-4.17.5-4.el8_8.noarch
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-common-4.17.5-4.el8_8.noarch
classification Moderate/Sec.  samba-common-4.17.5-4.el8_8.noarch
RHSA-2024:0580 Moderate/Sec.  samba-common-4.17.5-5.el8_8.noarch
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-common-4.17.5-5.el8_8.noarch
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-common-4.17.5-5.el8_8.noarch
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-common-4.17.5-5.el8_8.noarch
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-common-4.17.5-5.el8_8.noarch
classification Moderate/Sec.  samba-common-4.17.5-5.el8_8.noarch
RHSA-2023:4328 Moderate/Sec.  samba-common-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-common-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-common-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-common-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-common-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-common-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-common-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-common-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-common-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-common-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-common-tools-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-common-tools-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-common-tools-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-common-tools-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-common-tools-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-common-tools-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-common-tools-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-common-tools-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-common-tools-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-common-tools-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-dc-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-dc-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-dc-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-dc-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-dc-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-dc-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-dc-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-dc-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-dc-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-dc-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-dcerpc-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-dcerpc-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-dcerpc-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-dcerpc-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-dcerpc-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-dcerpc-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-dcerpc-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-dcerpc-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-dcerpc-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-dcerpc-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464)Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464)Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464)Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-tools-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-tools-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-tools-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-tools-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-tools-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-tools-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2023:7464) Moderate/Sec.  samba-tools-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-tools-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-winbind-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-winbind-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-winbind-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-winbind-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-winbind-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-winbind-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-winbind-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-winbind-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-winbind-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-winbind-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec.  samba-winbind-modules-4.17.5-3.el8_8.x86_64
CVE-2023-3347  (RHSA-2023:4328) Moderate/Sec.  samba-winbind-modules-4.17.5-3.el8_8.x86_64
classification Moderate/Sec.  samba-winbind-modules-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec.  samba-winbind-modules-4.17.5-4.el8_8.x86_64
CVE-2023-3961  (RHSA-2023:7464) Moderate/Sec.  samba-winbind-modules-4.17.5-4.el8_8.x86_64
CVE-2023-4091  (RHSA-2023:7464) Moderate/Sec.  samba-winbind-modules-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec.  samba-winbind-modules-4.17.5-4.el8_8.x86_64
classification Moderate/Sec.  samba-winbind-modules-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec.  samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2022-2127  (RHSA-2024:0580) Moderate/Sec.  samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec.  samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec.  samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec.  samba-winbind-modules-4.17.5-5.el8_8.x86_64
classification Moderate/Sec.  samba-winbind-modules-4.17.5-5.el8_8.x86_64
RHSA-2023:5264 Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2024:0569 Moderate/Sec.  seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2021-3750  (RHSA-2024:0569) Moderate/Sec.  seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3019  (RHSA-2024:0569) Moderate/Sec.  seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Moderate/Sec.  seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2023:5264 Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3354  (RHSA-2023:5264) Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2024:0569 Moderate/Sec.  seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2021-3750  (RHSA-2024:0569)Moderate/Sec.  seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3019  (RHSA-2024:0569)Moderate/Sec.  seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Moderate/Sec.  seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2024:0759 Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
ref_0          Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0589 Moderate/Sec.  sqlite-3.26.0-18.el8_8.1.x86_64
CVE-2023-7104  (RHSA-2024:0589) Moderate/Sec.  sqlite-3.26.0-18.el8_8.1.x86_64
classification Moderate/Sec.  sqlite-3.26.0-18.el8_8.1.x86_64
RHSA-2024:0589 Moderate/Sec.  sqlite-libs-3.26.0-18.el8_8.1.x86_64
CVE-2023-7104  (RHSA-2024:0589) Moderate/Sec.  sqlite-libs-3.26.0-18.el8_8.1.x86_64
classification Moderate/Sec.  sqlite-libs-3.26.0-18.el8_8.1.x86_64
RHSA-2023:4706 Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
classification Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2023:4706 Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
classification Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
RHSA-2023:4706 Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
CVE-2023-3899  (RHSA-2023:4706) Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
classification Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
RHSA-2024:0811 Moderate/Sec.  sudo-1.9.5p2-1.el8_8.x86_64
CVE-2023-28486 (RHSA-2024:0811) Moderate/Sec.  sudo-1.9.5p2-1.el8_8.x86_64
CVE-2023-28487 (RHSA-2024:0811) Moderate/Sec.  sudo-1.9.5p2-1.el8_8.x86_64
CVE-2023-42465 (RHSA-2024:0811) Moderate/Sec.  sudo-1.9.5p2-1.el8_8.x86_64
classification Moderate/Sec.  sudo-1.9.5p2-1.el8_8.x86_64
RHSA-2024:0571 Moderate/Sec.  tcpdump-14:4.9.3-3.el8_8.1.x86_64
CVE-2021-41043 (RHSA-2024:0571) Moderate/Sec.  tcpdump-14:4.9.3-3.el8_8.1.x86_64
classification Moderate/Sec.  tcpdump-14:4.9.3-3.el8_8.1.x86_64
RHSA-2024:0982 Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:0982) Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:0982) Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
classification Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64

8.6.24.02.SP15

The release date of the 8.6.24.02.SP15 security patch is 28 February 2024. The estimated run time is around 80 minutes.

The 8.6.24.02.SP15 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Restriction: 8.6.24.02.SP15 cannot be applied over Cloud Pak for Data System 2.0.2.1 IF1.
Restriction: Upgrading to Cloud Pak for Data System 2.0.2.1 IF1 after applying security patch 8.6.24.02.SP15 is not allowed. You need to wait for security patch 8.8.24.03.SP16 before upgrading to 2.0.2.1IF1. The security patch 8.8.24.03.SP16 is estimated to be available by the end of March.
Remember: The security patch 8.6.24.02.SP15 is the last based on RHEL 8.6, and the security patch 8.8.24.03.SP16 and later are based on RHEL 8.8.
Note:
During the 8.6.24.02.SP15 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
Note: If the parameter /boot value exceeds 100% capacity after applying the security patch 8.8.24.02.SP15, the following alerts might be displayed:

| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |

Workaround:

  1. Run the following command from all non SPU nodes to check the /boot parameter value:
    df -h /boot
    Example:
    df -h /boot
    Filesystem Size Used Avail Use% Mounted on
    /dev/sda1 190M 177M 0 100% /boot
  2. If the /boot parameter shows use of 95% or greater value, run the following commands on all non SPU nodes to free up storage in /boot.
    1. Run the following command to check which kernel versions are present in each non SPU node:
      
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
      Example:
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    2. Run the following command to find the default kernel version set:
      
      [root@e2n1 ~]# uname -r
      4.18.0-477.55.1.el8_8.x86_64
    3. If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
    4. Check the current kernel installed, as in step 2.a.
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    5. Set the default kernel based on the numbers in the previous steps:
      grub2-set-default 1
    6. Check that the default kernel is correctly set:
      grubby --default-kernel
    7. Run the following commands to reboot the node:
      sudo reboot
      Alternatively, via ipmitool:
      • For Dell system
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power on
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
      • For Lenovo system
        ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on
        ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
    8. After the reboot, run the following command to check the current kernel:
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
    9. Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
      grub2-set-default 1

      Skip the step 3.

  3. Run the following command from all non SPU nodes:
    package-cleanup --oldkernels --count=1
    Note: When the older kernel is removed, the grub2.cfg list (In Step 2.a) will get shuffled. Make sure that the grubenv (Step 2.b) points to the available current version.

    If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.

The list of Red Hat CVEs, which are patched in this release:
RHSA-2024:0418 Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
CVE-2021-3468  Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38469 Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38470 Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38471 Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38472 Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38473 Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
classification Moderate/Sec.  avahi-0.7-20.el8_6.3.x86_64
RHSA-2024:0418 Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2021-3468  Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38469 Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38470 Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38471 Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38472 Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38473 Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
classification Moderate/Sec.  avahi-glib-0.7-20.el8_6.3.x86_64
RHSA-2024:0418 Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2021-3468  Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38469 Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38470 Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38471 Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38472 Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38473 Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
classification Moderate/Sec.  avahi-libs-0.7-20.el8_6.3.x86_64
RHSA-2024:0419 Moderate/Sec.  c-ares-1.13.0-6.el8_6.3.x86_64
CVE-2020-22217 Moderate/Sec.  c-ares-1.13.0-6.el8_6.3.x86_64
classification Moderate/Sec.  c-ares-1.13.0-6.el8_6.3.x86_64
RHSA-2024:0428 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
CVE-2022-35252 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
CVE-2022-43552 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27535 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27536 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-28322 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-46218 Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
classification Moderate/Sec.  curl-7.61.1-22.el8_6.12.x86_64
RHSA-2024:0421 Moderate/Sec.  expat-2.2.5-8.el8_6.4.x86_64
CVE-2022-43680 Moderate/Sec.  expat-2.2.5-8.el8_6.4.x86_64
classification Moderate/Sec.  expat-2.2.5-8.el8_6.4.x86_64
RHSA-2024:0420 Moderate/Sec.  freetype-2.9.1-5.el8_6.3.x86_64
CVE-2022-27404 Moderate/Sec.  freetype-2.9.1-5.el8_6.3.x86_64
CVE-2022-27405 Moderate/Sec.  freetype-2.9.1-5.el8_6.3.x86_64
CVE-2022-27406 Moderate/Sec.  freetype-2.9.1-5.el8_6.3.x86_64
classification Moderate/Sec.  freetype-2.9.1-5.el8_6.3.x86_64
RHSA-2024:0319 Moderate/Sec.  gnutls-3.6.16-5.el8_6.2.x86_64
CVE-2023-5981  Moderate/Sec.  gnutls-3.6.16-5.el8_6.2.x86_64
classification Moderate/Sec.  gnutls-3.6.16-5.el8_6.2.x86_64
RHSA-2024:0412 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec.  krb5-devel-1.18.2-16.el8_6.x86_64
RHEL-17108     Moderate/Sec.  krb5-devel-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec.  krb5-devel-1.18.2-16.el8_6.x86_64
CVE-2023-5455  Moderate/Sec.  krb5-devel-1.18.2-16.el8_6.x86_64
classification Moderate/Sec.  krb5-devel-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec.  krb5-libs-1.18.2-16.el8_6.x86_64
RHEL-17108     Moderate/Sec.  krb5-libs-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec.  krb5-libs-1.18.2-16.el8_6.x86_64
CVE-2023-5455  Moderate/Sec.  krb5-libs-1.18.2-16.el8_6.x86_64
classification Moderate/Sec.  krb5-libs-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec.  krb5-pkinit-1.18.2-16.el8_6.x86_64
RHEL-17108     Moderate/Sec.  krb5-pkinit-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec.  krb5-pkinit-1.18.2-16.el8_6.x86_64
CVE-2023-5455  Moderate/Sec.  krb5-pkinit-1.18.2-16.el8_6.x86_64
classification Moderate/Sec.  krb5-pkinit-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec.  krb5-server-1.18.2-16.el8_6.x86_64
RHEL-17108     Moderate/Sec.  krb5-server-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec.  krb5-server-1.18.2-16.el8_6.x86_64
CVE-2023-5455  Moderate/Sec.  krb5-server-1.18.2-16.el8_6.x86_64
classification Moderate/Sec.  krb5-server-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec.  krb5-workstation-1.18.2-16.el8_6.x86_64
RHEL-17108     Moderate/Sec.  krb5-workstation-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec.  krb5-workstation-1.18.2-16.el8_6.x86_64
CVE-2023-5455  Moderate/Sec.  krb5-workstation-1.18.2-16.el8_6.x86_64
classification Moderate/Sec.  krb5-workstation-1.18.2-16.el8_6.x86_64
RHSA-2024:0146 Low/Sec.       libarchive-3.3.3-4.el8_6.x86_64
CVE-2022-36227 Low/Sec.       libarchive-3.3.3-4.el8_6.x86_64
classification Low/Sec.       libarchive-3.3.3-4.el8_6.x86_64
RHSA-2024:0428 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2022-35252 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2022-43552 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27535 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27536 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-28322 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-46218 Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
classification Moderate/Sec.  libcurl-7.61.1-22.el8_6.12.x86_64
RHSA-2024:0252 Moderate/Sec.  libkadm5-1.18.2-16.el8_6.x86_64
RHEL-17108     Moderate/Sec.  libkadm5-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec.  libkadm5-1.18.2-16.el8_6.x86_64
CVE-2023-5455  Moderate/Sec.  libkadm5-1.18.2-16.el8_6.x86_64
classification Moderate/Sec.  libkadm5-1.18.2-16.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  libsmbclient-4.15.5-15.el8_6.x86_64
RHSA-2024:0538 Moderate/Sec.  libssh-0.9.6-4.el8_6.x86_64
CVE-2023-1667  Moderate/Sec.  libssh-0.9.6-4.el8_6.x86_64
CVE-2023-2283  Moderate/Sec.  libssh-0.9.6-4.el8_6.x86_64
CVE-2023-48795 Moderate/Sec.  libssh-0.9.6-4.el8_6.x86_64
classification Moderate/Sec.  libssh-0.9.6-4.el8_6.x86_64
RHSA-2024:0538 Moderate/Sec.  libssh-config-0.9.6-4.el8_6.noarch
CVE-2023-1667  Moderate/Sec.  libssh-config-0.9.6-4.el8_6.noarch
CVE-2023-2283  Moderate/Sec.  libssh-config-0.9.6-4.el8_6.noarch
CVE-2023-48795 Moderate/Sec.  libssh-config-0.9.6-4.el8_6.noarch
classification Moderate/Sec.  libssh-config-0.9.6-4.el8_6.noarch
RHSA-2024:0427 Moderate/Sec.  libtasn1-4.13-3.el8_6.1.x86_64
CVE-2021-46848 Moderate/Sec.  libtasn1-4.13-3.el8_6.1.x86_64
classification Moderate/Sec.  libtasn1-4.13-3.el8_6.1.x86_64
RHSA-2024:0423 Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  libwbclient-4.15.5-15.el8_6.x86_64
RHSA-2024:0413 Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40303 Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40304 Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-28484 Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-29469 Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-39615 Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
classification Moderate/Sec.  libxml2-2.9.7-13.el8_6.4.x86_64
RHSA-2024:0416 Moderate/Sec.  ncurses-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec.  ncurses-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec.  ncurses-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0416 Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_6.1.noarch
CVE-2023-29491 Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_6.1.noarch
classification Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_6.1.noarch
RHSA-2024:0416 Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0416 Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0416 Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0429 Moderate/Sec.  openssh-8.0p1-15.el8_6.3.x86_64
CVE-2023-48795 Moderate/Sec.  openssh-8.0p1-15.el8_6.3.x86_64
CVE-2023-51385 Moderate/Sec.  openssh-8.0p1-15.el8_6.3.x86_64
classification Moderate/Sec.  openssh-8.0p1-15.el8_6.3.x86_64
RHSA-2024:0429 Moderate/Sec.  openssh-clients-8.0p1-15.el8_6.3.x86_64
CVE-2023-48795 Moderate/Sec.  openssh-clients-8.0p1-15.el8_6.3.x86_64
CVE-2023-51385 Moderate/Sec.  openssh-clients-8.0p1-15.el8_6.3.x86_64
classification Moderate/Sec.  openssh-clients-8.0p1-15.el8_6.3.x86_64
RHSA-2024:0429 Moderate/Sec.  openssh-server-8.0p1-15.el8_6.3.x86_64
CVE-2023-48795 Moderate/Sec.  openssh-server-8.0p1-15.el8_6.3.x86_64
CVE-2023-51385 Moderate/Sec.  openssh-server-8.0p1-15.el8_6.3.x86_64
classification Moderate/Sec.  openssh-server-8.0p1-15.el8_6.3.x86_64
RHSA-2024:0208 Low/Sec.       openssl-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3446  Low/Sec.       openssl-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3817  Low/Sec.       openssl-1:1.1.1k-12.el8_6.x86_64
CVE-2023-5678  Low/Sec.       openssl-1:1.1.1k-12.el8_6.x86_64
classification Low/Sec.       openssl-1:1.1.1k-12.el8_6.x86_64
RHSA-2024:0208 Low/Sec.       openssl-devel-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3446  Low/Sec.       openssl-devel-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3817  Low/Sec.       openssl-devel-1:1.1.1k-12.el8_6.x86_64
CVE-2023-5678  Low/Sec.       openssl-devel-1:1.1.1k-12.el8_6.x86_64
classification Low/Sec.       openssl-devel-1:1.1.1k-12.el8_6.x86_64
RHSA-2024:0208 Low/Sec.       openssl-libs-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3446  Low/Sec.       openssl-libs-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3817  Low/Sec.       openssl-libs-1:1.1.1k-12.el8_6.x86_64
CVE-2023-5678  Low/Sec.       openssl-libs-1:1.1.1k-12.el8_6.x86_64
classification Low/Sec.       openssl-libs-1:1.1.1k-12.el8_6.x86_64
RHSA-2024:0412 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0422 Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_6.1.noarch
CVE-2023-31486 Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_6.1.noarch
classification Moderate/Sec.  perl-HTTP-Tiny-0.074-1.el8_6.1.noarch
RHSA-2024:0430 Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2007-4559  Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2020-10735 Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2022-45061 Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2022-48560 Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2022-48564 Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2023-27043 Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
classification Moderate/Sec.  platform-python-3.6.8-47.el8_6.4.x86_64
RHSA-2024:0374 Moderate/Sec.  platform-python-pip-9.0.3-22.1.el8_6.noarch
CVE-2007-4559  Moderate/Sec.  platform-python-pip-9.0.3-22.1.el8_6.noarch
classification Moderate/Sec.  platform-python-pip-9.0.3-22.1.el8_6.noarch
RHSA-2024:0430 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2007-4559  Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2020-10735 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2022-45061 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2022-48560 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2022-48564 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2023-27043 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
classification Moderate/Sec.  python3-libs-3.6.8-47.el8_6.4.x86_64
RHSA-2024:0413 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40303 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40304 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-28484 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-29469 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-39615 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
classification Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.4.x86_64
RHSA-2024:0412 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562  Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
ref_0          Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0374 Moderate/Sec.  python3-pip-wheel-9.0.3-22.1.el8_6.noarch
CVE-2007-4559  Moderate/Sec.  python3-pip-wheel-9.0.3-22.1.el8_6.noarch
classification Moderate/Sec.  python3-pip-wheel-9.0.3-22.1.el8_6.noarch
RHSA-2024:0299 Moderate/Sec.  python3-requests-2.20.0-3.el8_6.noarch
CVE-2023-32681 Moderate/Sec.  python3-requests-2.20.0-3.el8_6.noarch
classification Moderate/Sec.  python3-requests-2.20.0-3.el8_6.noarch
RHSA-2024:0424 Moderate/Sec.  python3-rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  python3-rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  python3-rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  python3-rpm-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  python3-rpm-4.14.3-26.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  python3-samba-4.15.5-15.el8_6.x86_64
RHSA-2024:0300 Moderate/Sec.  python3-urllib3-1.24.2-5.el8_6.1.noarch
CVE-2023-43804 Moderate/Sec.  python3-urllib3-1.24.2-5.el8_6.1.noarch
CVE-2023-45803 Moderate/Sec.  python3-urllib3-1.24.2-5.el8_6.1.noarch
classification Moderate/Sec.  python3-urllib3-1.24.2-5.el8_6.1.noarch
RHSA-2024:0424 Moderate/Sec.  rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  rpm-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  rpm-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec.  rpm-build-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  rpm-build-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  rpm-build-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  rpm-build-libs-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  rpm-build-libs-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec.  rpm-devel-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  rpm-devel-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  rpm-devel-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  rpm-devel-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  rpm-devel-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec.  rpm-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  rpm-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  rpm-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  rpm-libs-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  rpm-libs-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec.  rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
classification Moderate/Sec.  rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
RHSA-2024:0254 Moderate/Sec.  rsync-3.1.3-14.el8_6.5.x86_64
CVE-2022-37434 Moderate/Sec.  rsync-3.1.3-14.el8_6.5.x86_64
classification Moderate/Sec.  rsync-3.1.3-14.el8_6.5.x86_64
RHSA-2024:0254 Moderate/Sec.  rsync-daemon-3.1.3-14.el8_6.5.noarch
CVE-2022-37434 Moderate/Sec.  rsync-daemon-3.1.3-14.el8_6.5.noarch
classification Moderate/Sec.  rsync-daemon-3.1.3-14.el8_6.5.noarch
RHSA-2024:0423 Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-client-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-client-libs-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
CVE-2022-1615  Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
CVE-2022-2127  Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
CVE-2023-34966 Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
CVE-2023-34967 Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
CVE-2023-34968 Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
classification Moderate/Sec.  samba-common-4.15.5-15.el8_6.noarch
RHSA-2024:0423 Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-common-libs-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-common-tools-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-libs-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-winbind-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2022-1615  Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2022-2127  Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
classification Moderate/Sec.  samba-winbind-modules-4.15.5-15.el8_6.x86_64
RHSA-2024:0417 Low/Sec.       shadow-utils-2:4.6-17.el8_6.x86_64
CVE-2023-4641  Low/Sec.       shadow-utils-2:4.6-17.el8_6.x86_64
classification Low/Sec.       shadow-utils-2:4.6-17.el8_6.x86_64
RHSA-2024:0417 Low/Sec.       shadow-utils-subid-2:4.6-17.el8_6.x86_64
CVE-2023-4641  Low/Sec.       shadow-utils-subid-2:4.6-17.el8_6.x86_64
classification Low/Sec.       shadow-utils-subid-2:4.6-17.el8_6.x86_64
RHSA-2024:0425 Moderate/Sec.  sqlite-3.26.0-16.el8_6.1.x86_64
CVE-2020-24736 Moderate/Sec.  sqlite-3.26.0-16.el8_6.1.x86_64
CVE-2022-35737 Moderate/Sec.  sqlite-3.26.0-16.el8_6.1.x86_64
classification Moderate/Sec.  sqlite-3.26.0-16.el8_6.1.x86_64
RHSA-2024:0425 Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.1.x86_64
CVE-2020-24736 Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.1.x86_64
CVE-2022-35737 Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.1.x86_64
classification Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.1.x86_64

8.6.23.12.SP14

The release date of the 8.6.23.12.SP14 security patch is 29 January 2024. The estimated run time is around 80 minutes.

The 8.6.23.12.SP14 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note: Upgrading to Cloud Pak for Data System 2.0.2.1 IF1 after applying 8.6.23.12.SP14 overwrites the fix for the CVE-2023-2603 and CVE-2022-40897. To resolve them, contact IBM support.
Restriction: 8.6.23.12.SP14 cannot be applied over Cloud Pak for Data System 2.0.2.1 IF1.
Note:
During the 8.6.23.12.SP14 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
Note: If the parameter /boot value exceeds 100% capacity after applying the security patch 8.6.23.12.SP14, the following alerts might be displayed:

| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |

Workaround:

  1. Run the following command from all non SPU nodes to check the /boot parameter value:
    df -h /boot
    Example:
    df -h /boot
    Filesystem Size Used Avail Use% Mounted on
    /dev/sda1 190M 177M 0 100% /boot
  2. If the /boot parameter shows use of 95% or greater value, run the following commands on all non SPU nodes to free up storage in /boot.
    1. Run the following command to check which kernel versions are present in each non SPU node:
      
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
      Example:
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    2. Run the following command to find the default kernel version set:
      
      [root@e2n1 ~]# uname -r
      4.18.0-477.55.1.el8_8.x86_64
    3. If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
    4. Check the current kernel installed, as in step 2.a.
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    5. Set the default kernel based on the numbers in the previous steps:
      grub2-set-default 1
    6. Check that the default kernel is correctly set:
      grubby --default-kernel
    7. Run the following commands to reboot the node:
      sudo reboot
      Alternatively, via ipmitool:
      • For Dell system
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power on
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
      • For Lenovo system
        ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on
        ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
    8. After the reboot, run the following command to check the current kernel:
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
    9. Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
      grub2-set-default 1

      Skip the step 3.

  3. Run the following command from all non SPU nodes:
    package-cleanup --oldkernels --count=1
    Note: When the older kernel is removed, the grub2.cfg list (In Step 2.a) will get shuffled. Make sure that the grubenv (Step 2.b) points to the available current version.

    If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.

The list of Red Hat CVEs, which are patched in this release:
RHSA-2023:7394 Moderate/Sec.  binutils-2.30-113.el8_6.2.x86_64
CVE-2022-4285  Moderate/Sec.  binutils-2.30-113.el8_6.2.x86_64
classification Moderate/Sec.  binutils-2.30-113.el8_6.2.x86_64
RHSA-2023:7392 Moderate/Sec.  c-ares-1.13.0-6.el8_6.2.x86_64
CVE-2023-31130 Moderate/Sec.  c-ares-1.13.0-6.el8_6.2.x86_64
classification Moderate/Sec.  c-ares-1.13.0-6.el8_6.2.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-all-langpacks-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-all-langpacks-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-all-langpacks-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-all-langpacks-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-common-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-common-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-common-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-common-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-devel-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-devel-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-devel-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-devel-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-gconv-extra-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-gconv-extra-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-gconv-extra-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-gconv-extra-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-headers-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-headers-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-headers-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-headers-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-langpack-en-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-langpack-en-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-langpack-en-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-langpack-en-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-locale-source-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-locale-source-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-locale-source-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-locale-source-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
RHSA-2023:7401 Moderate/Sec.  iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
classification Moderate/Sec.  iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
classification Moderate/Sec.  iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
classification Moderate/Sec.  iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
classification Moderate/Sec.  iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
classification Moderate/Sec.  iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
classification Moderate/Sec.  iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
RHSA-2023:7398 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7400 Moderate/Sec.  libcap-2.48-4.el8_6.x86_64
CVE-2023-2602  Moderate/Sec.  libcap-2.48-4.el8_6.x86_64
CVE-2023-2603  Moderate/Sec.  libcap-2.48-4.el8_6.x86_64
classification Moderate/Sec.  libcap-2.48-4.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  libnsl-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  libnsl-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  libnsl-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  libnsl-2.28-189.8.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  libsmbclient-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  libsmbclient-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  libsmbclient-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  libsmbclient-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  libsmbclient-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  libwbclient-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  libwbclient-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  libwbclient-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  libwbclient-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  libwbclient-4.15.5-13.el8_6.x86_64
RHSA-2023:7401 Moderate/Sec.  linux-firmware-20220210-112.git6342082c.el8_6.noarch
CVE-2023-20569 Moderate/Sec.  linux-firmware-20220210-112.git6342082c.el8_6.noarch
CVE-2023-20593 Moderate/Sec.  linux-firmware-20220210-112.git6342082c.el8_6.noarch
classification Moderate/Sec.  linux-firmware-20220210-112.git6342082c.el8_6.noarch
RHSA-2023:7409 Moderate/Sec.  nscd-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  nscd-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  nscd-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  nscd-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec.  nss_db-2.28-189.8.el8_6.x86_64
CVE-2023-4806  Moderate/Sec.  nss_db-2.28-189.8.el8_6.x86_64
CVE-2023-4813  Moderate/Sec.  nss_db-2.28-189.8.el8_6.x86_64
classification Moderate/Sec.  nss_db-2.28-189.8.el8_6.x86_64
RHSA-2023:7398 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7395 Moderate/Sec.  platform-python-setuptools-39.2.0-7.el8_6.noarch
CVE-2022-40897 Moderate/Sec.  platform-python-setuptools-39.2.0-7.el8_6.noarch
classification Moderate/Sec.  platform-python-setuptools-39.2.0-7.el8_6.noarch
RHSA-2023:7398 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177  Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609  Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776  Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  python3-samba-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  python3-samba-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  python3-samba-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  python3-samba-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  python3-samba-4.15.5-13.el8_6.x86_64
RHSA-2023:7395 Moderate/Sec.  python3-setuptools-39.2.0-7.el8_6.noarch
CVE-2022-40897 Moderate/Sec.  python3-setuptools-39.2.0-7.el8_6.noarch
classification Moderate/Sec.  python3-setuptools-39.2.0-7.el8_6.noarch
RHSA-2023:7395 Moderate/Sec.  python3-setuptools-wheel-39.2.0-7.el8_6.noarch
CVE-2022-40897 Moderate/Sec.  python3-setuptools-wheel-39.2.0-7.el8_6.noarch
classification Moderate/Sec.  python3-setuptools-wheel-39.2.0-7.el8_6.noarch
RHSA-2023:7408 Moderate/Sec.  samba-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-client-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-client-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-client-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-client-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-client-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-client-libs-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-client-libs-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-client-libs-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-client-libs-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-client-libs-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-common-4.15.5-13.el8_6.noarch
CVE-2023-3961  Moderate/Sec.  samba-common-4.15.5-13.el8_6.noarch
CVE-2023-4091  Moderate/Sec.  samba-common-4.15.5-13.el8_6.noarch
CVE-2023-42669 Moderate/Sec.  samba-common-4.15.5-13.el8_6.noarch
classification Moderate/Sec.  samba-common-4.15.5-13.el8_6.noarch
RHSA-2023:7408 Moderate/Sec.  samba-common-libs-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-common-libs-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-common-libs-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-common-libs-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-common-libs-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-common-tools-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-common-tools-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-common-tools-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-common-tools-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-common-tools-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-libs-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-libs-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-libs-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-libs-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-libs-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-winbind-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-winbind-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-winbind-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-winbind-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-winbind-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec.  samba-winbind-modules-4.15.5-13.el8_6.x86_64
CVE-2023-3961  Moderate/Sec.  samba-winbind-modules-4.15.5-13.el8_6.x86_64
CVE-2023-4091  Moderate/Sec.  samba-winbind-modules-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec.  samba-winbind-modules-4.15.5-13.el8_6.x86_64
classification Moderate/Sec.  samba-winbind-modules-4.15.5-13.el8_6.x86_64

8.6.23.11.SP13

The release date of the 8.6.23.11.SP13 security patch is 1 December 2023. The estimated run time is around 80 minutes.

The 8.6.23.11.SP13 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note: Upgrading to Cloud Pak for Data System 2.0.2.1 IF1 after applying 8.6.23.11.SP13 overwrites the fix for the CVE-2023-44487. To resolve this CVE, contact IBM support.
Restriction: 8.6.23.11.SP13 cannot be applied over Cloud Pak for Data System 2.0.2.1 IF1.
Note:
During the 8.6.23.11.SP13 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
Error 3
Upgrade might fail with the error:
Unable to unload devtrace on node eXnY
For example:
Unable to unload devtrace on node e3n1
Workaround
For the workaround, see the tech note.
Note: If the parameter /boot value exceeds 100% capacity after applying the security patch 8.6.23.11.SP13, the following alerts might be displayed:

| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |

Workaround:

  1. Run the following command from all non SPU nodes to check the /boot parameter value:
    df -h /boot
    Example:
    df -h /boot
    Filesystem Size Used Avail Use% Mounted on
    /dev/sda1 190M 177M 0 100% /boot
  2. If the /boot parameter shows use of 95% or greater value, run the following commands on all non SPU nodes to free up storage in /boot.
    1. Run the following command to check which kernel versions are present in each non SPU node:
      
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
      Example:
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    2. Run the following command to find the default kernel version set:
      
      [root@e2n1 ~]# uname -r
      4.18.0-477.55.1.el8_8.x86_64
    3. If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
    4. Check the current kernel installed, as in step 2.a.
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    5. Set the default kernel based on the numbers in the previous steps:
      grub2-set-default 1
    6. Check that the default kernel is correctly set:
      grubby --default-kernel
    7. Run the following commands to reboot the node:
      sudo reboot
      Alternatively, via ipmitool:
      • For Dell system
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power on
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
      • For Lenovo system
        ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on
        ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
    8. After the reboot, run the following command to check the current kernel:
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
    9. Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
      grub2-set-default 1

      Skip the step 3.

  3. Run the following command from all non SPU nodes:
    package-cleanup --oldkernels --count=1
    Note: When the older kernel is removed, the grub2.cfg list (In Step 2.a) will get shuffled. Make sure that the grubenv (Step 2.b) points to the available current version.

    If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.

The list of Red Hat CVEs, which are patched in this release:
RHSA-2023:6292 Moderate/Sec.  curl-7.61.1-22.el8_6.9.x86_64
CVE-2023-28321 Moderate/Sec.  curl-7.61.1-22.el8_6.9.x86_64
CVE-2023-38546 Moderate/Sec.  curl-7.61.1-22.el8_6.9.x86_64
classification Moderate/Sec.  curl-7.61.1-22.el8_6.9.x86_64
RHSA-2023:5627 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:6292 Moderate/Sec.  libcurl-7.61.1-22.el8_6.9.x86_64
CVE-2023-28321 Moderate/Sec.  libcurl-7.61.1-22.el8_6.9.x86_64
CVE-2023-38546 Moderate/Sec.  libcurl-7.61.1-22.el8_6.9.x86_64
classification Moderate/Sec.  libcurl-7.61.1-22.el8_6.9.x86_64
RHSA-2023:5769 Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
CVE-2023-44487 Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
classification Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
ref_0          Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
RHSA-2023:5627 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5531 Important/Sec. platform-python-3.6.8-47.el8_6.2.x86_64
CVE-2023-40217 Important/Sec. platform-python-3.6.8-47.el8_6.2.x86_64
classification Important/Sec. platform-python-3.6.8-47.el8_6.2.x86_64
RHSA-2023:5531 Important/Sec. python3-libs-3.6.8-47.el8_6.2.x86_64
CVE-2023-40217 Important/Sec. python3-libs-3.6.8-47.el8_6.2.x86_64
classification Important/Sec. python3-libs-3.6.8-47.el8_6.2.x86_64
RHSA-2023:5627 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128  Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5610 Moderate/Sec.  tar-2:1.30-5.el8_6.1.x86_64
CVE-2022-48303 Moderate/Sec.  tar-2:1.30-5.el8_6.1.x86_64
classification Moderate/Sec.  tar-2:1.30-5.el8_6.1.x86_64
CVE-2023-40217 - platform-python-devel-3.6.8-47.el8_6.2.x86_64.rpm

8.6.23.10.SP12

The release date of the 8.6.23.10.SP12 security patch is 19 October 2023. The estimated run time is around 80 minutes.

The 8.6.23.10.SP12 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Restriction: 8.6.23.10.SP12 cannot be applied over Cloud Pak for Data System 2.0.2.1 IF1.
Note:
During the 8.6.23.10.SP12 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
Note: If the parameter /boot value exceeds 100% capacity after applying the security patch 8.6.23.10.SP12, the following alerts might be displayed:

| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |

Workaround:

  1. Run the following command from all non SPU nodes to check the /boot parameter value:
    df -h /boot
    Example:
    df -h /boot
    Filesystem Size Used Avail Use% Mounted on
    /dev/sda1 190M 177M 0 100% /boot
  2. If the /boot parameter shows use of 95% or greater value, run the following commands on all non SPU nodes to free up storage in /boot.
    1. Run the following command to check which kernel versions are present in each non SPU node:
      
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
      Example:
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    2. Run the following command to find the default kernel version set:
      
      [root@e2n1 ~]# uname -r
      4.18.0-477.55.1.el8_8.x86_64
    3. If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
    4. Check the current kernel installed, as in step 2.a.
      
      [root@e2n1 ~]# grubby --info=ALL | grep title
      title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)"
      title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
    5. Set the default kernel based on the numbers in the previous steps:
      grub2-set-default 1
    6. Check that the default kernel is correctly set:
      grubby --default-kernel
    7. Run the following commands to reboot the node:
      sudo reboot
      Alternatively, via ipmitool:
      • For Dell system
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power on
        ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
      • For Lenovo system
        ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on
        ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
    8. After the reboot, run the following command to check the current kernel:
      [root@e2n1 ~]# grubby --default-kernel
      /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
    9. Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
      grub2-set-default 1

      Skip the step 3.

  3. Run the following command from all non SPU nodes:
    package-cleanup --oldkernels --count=1
    Note: When the older kernel is removed, the grub2.cfg list (In Step 2.a) will get shuffled. Make sure that the grubenv (Step 2.b) points to the available current version.

    If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.

The list of Red Hat CVEs, which are patched in this release:
RHSA-2023:5473 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.5.x86_64
CVE-2023-3341  Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.5.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.5.x86_64
RHSA-2023:5193 Moderate/Sec.  dbus-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec.  dbus-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec.  dbus-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5193 Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.3.noarch
CVE-2023-34969 Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.3.noarch
classification Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.3.noarch
RHSA-2023:5193 Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5193 Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5193 Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5476 Important/Sec. glibc-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-all-langpacks-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-all-langpacks-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-all-langpacks-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-common-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-common-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-common-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-devel-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-devel-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-devel-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-gconv-extra-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-gconv-extra-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-gconv-extra-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-headers-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-headers-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-headers-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-langpack-en-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-langpack-en-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-langpack-en-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-locale-source-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-locale-source-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-locale-source-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-minimal-langpack-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. glibc-minimal-langpack-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-minimal-langpack-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. libnsl-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. libnsl-2.28-189.6.el8_6.x86_64
classification Important/Sec. libnsl-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. nscd-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. nscd-2.28-189.6.el8_6.x86_64
classification Important/Sec. nscd-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. nss_db-2.28-189.6.el8_6.x86_64
CVE-2023-4911  Important/Sec. nss_db-2.28-189.6.el8_6.x86_64
classification Important/Sec. nss_db-2.28-189.6.el8_6.x86_64

8.6.23.09.SP11

The release date of the 8.6.23.09.SP11 security patch is 26 September 2023. The estimated run time is around 90 minutes.

The 8.6.23.09.SP11 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Restriction: 8.6.23.09.SP11 cannot be applied over Cloud Pak for Data System 2.0.2.1 IF1.
Note:
During the 8.6.23.09.SP11 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
The list of Red Hat CVEs which are patched in this release:
RHSA-2023:4101 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.4.x86_64
CVE-2023-2828  Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.4.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.4.x86_64
RHSA-2023:4413 Important/Sec. openssh-8.0p1-15.el8_6.x86_64
CVE-2023-38408 Important/Sec. openssh-8.0p1-15.el8_6.x86_64
classification Important/Sec. openssh-8.0p1-15.el8_6.x86_64
RHSA-2023:4413 Important/Sec. openssh-clients-8.0p1-15.el8_6.x86_64
CVE-2023-38408 Important/Sec. openssh-clients-8.0p1-15.el8_6.x86_64
classification Important/Sec. openssh-clients-8.0p1-15.el8_6.x86_64
RHSA-2023:4413 Important/Sec. openssh-server-8.0p1-15.el8_6.x86_64
CVE-2023-38408 Important/Sec. openssh-server-8.0p1-15.el8_6.x86_64
classification Important/Sec. openssh-server-8.0p1-15.el8_6.x86_64
RHSA-2023:4770 Important/Sec. cups-libs-1:2.2.6-45.el8_6.3.x86_64
CVE-2023-32360 Important/Sec. cups-libs-1:2.2.6-45.el8_6.3.x86_64
classification Important/Sec. cups-libs-1:2.2.6-45.el8_6.3.x86_64
CVE-2023-32360 - cups-2.2.6-51.el8_8.1.x86_64.rpm
CVE-2023-32360 - cups-client-2.2.6-51.el8_8.1.x86_64.rpm
CVE-2023-32360 - cups-filesystem-2.2.6-51.el8_8.1.noarch.rpm
CVE-2023-32360 - cups-ipptool-2.2.6-51.el8_8.1.x86_64.rpm
RHSA-2023:4705 Important/Sec. dnf-plugin-subscription-manager-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899  Important/Sec. dnf-plugin-subscription-manager-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. dnf-plugin-subscription-manager-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64   
RHSA-2023:4789 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4767 Moderate/Sec.  libxml2-2.9.7-13.el8_6.2.x86_64
CVE-2016-3709  Moderate/Sec.  libxml2-2.9.7-13.el8_6.2.x86_64
classification Moderate/Sec.  libxml2-2.9.7-13.el8_6.2.x86_64
RHSA-2023:4789 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4705 Important/Sec. python3-cloud-what-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899  Important/Sec. python3-cloud-what-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. python3-cloud-what-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4767 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.2.x86_64
CVE-2016-3709  Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.2.x86_64
classification Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.2.x86_64
RHSA-2023:4789 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637  Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829  Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002  Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124  Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390  Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4705 Important/Sec. python3-subscription-manager-rhsm-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899  Important/Sec. python3-subscription-manager-rhsm-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. python3-subscription-manager-rhsm-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4705 Important/Sec. python3-syspurpose-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899  Important/Sec. python3-syspurpose-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. python3-syspurpose-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4705 Important/Sec. rhsm-icons-1.28.29.1-2.el8_6.noarch
CVE-2023-3899  Important/Sec. rhsm-icons-1.28.29.1-2.el8_6.noarch
classification Important/Sec. rhsm-icons-1.28.29.1-2.el8_6.noarch
RHSA-2023:4705 Important/Sec. subscription-manager-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899  Important/Sec. subscription-manager-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. subscription-manager-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4705 Important/Sec. subscription-manager-cockpit-1.28.29.1-2.el8_6.noarch
CVE-2023-3899  Important/Sec. subscription-manager-cockpit-1.28.29.1-2.el8_6.noarch
classification Important/Sec. subscription-manager-cockpit-1.28.29.1-2.el8_6.noarch
RHSA-2023:4705 Important/Sec. subscription-manager-rhsm-certificates-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899  Important/Sec. subscription-manager-rhsm-certificates-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. subscription-manager-rhsm-certificates-1.28.29.1-2.el8_6.x86_64

8.6.23.07.SP10

The release date of 8.6.23.07.SP10 security patch is 14 August 2023. The estimated run time is around 80 minutes.

The 8.6.23.07.SP10 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.07.SP10 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
Error 3
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.07.SP10, the upgrade might fail with the following error:
1. McpUpgrader.install
        Upgrade Detail: Component install for mcp
        Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
        Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update

Workaround
  1. Run the following command to extract RPMs:
    cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
    
  2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
    for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
    
  3. Install the copied node-os*.rpm.
    for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
    
  4. Rerun the same apupgrade command that failed:
    apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
    
The list of Red Hat CVEs which are patched in this release:
RHSA-2023:3796 Important/Sec. platform-python-3.6.8-47.el8_6.1.x86_64
CVE-2023-24329 Important/Sec. platform-python-3.6.8-47.el8_6.1.x86_64
classification Important/Sec. platform-python-3.6.8-47.el8_6.1.x86_64
RHSA-2023:3796 Important/Sec. python3-libs-3.6.8-47.el8_6.1.x86_64
CVE-2023-24329 Important/Sec. python3-libs-3.6.8-47.el8_6.1.x86_64
classification Important/Sec. python3-libs-3.6.8-47.el8_6.1.x86_64

8.6.23.06.SP9

The release date of 8.6.23.06.SP9 security patch is 18 July 2023. The estimated run time is around 90 minutes.

The 8.6.23.06.SP9 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.06.SP9 security patch application, you might run into the following errors:
Error 1
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
This error occurs due to a mismatch in the RHEL versions.
Workaround
From e1n1, run the following commands to patch the code in the existing scripts:
  1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
  3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
  4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
Error 2
FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
This error happens after apupgrade starts the system, brings it to Ready state, and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
Workaround
  1. Wait for apupgrade to time out.
  2. Run oc login command that is written in the log. For example:
    oc login -u system:admin -n default https://api.localcluster.fbond:6443
  3. Restart the upgrade.
Error 3
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.06.SP9, the upgrade might fail with the following error:
1. McpUpgrader.install
        Upgrade Detail: Component install for mcp
        Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
        Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update

Workaround
  1. Run the following command to extract RPMs:
    cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
    
  2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
    for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
    
  3. Install the copied node-os*.rpm.
    for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
    
  4. Rerun the same apupgrade command that failed:
    apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
    
The list of Red Hat CVEs that are patched in this release:
RHSA-2023:3662 Important/Sec. c-ares-1.13.0-6.el8_6.1.x86_64
CVE-2023-32067 Important/Sec. c-ares-1.13.0-6.el8_6.1.x86_64
classification Important/Sec. c-ares-1.13.0-6.el8_6.1.x86_64
RHSA-2023:3361 Moderate/Sec.  gnutls-3.6.16-5.el8_6.1.x86_64
CVE-2023-0361  Moderate/Sec.  gnutls-3.6.16-5.el8_6.1.x86_64
classification Moderate/Sec.  gnutls-3.6.16-5.el8_6.1.x86_64
RHSA-2023:3388 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3408 Moderate/Sec.  openssl-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4304  Moderate/Sec.  openssl-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4450  Moderate/Sec.  openssl-1:1.1.1k-9.el8_6.x86_64
CVE-2023-0215  Moderate/Sec.  openssl-1:1.1.1k-9.el8_6.x86_64
classification Moderate/Sec.  openssl-1:1.1.1k-9.el8_6.x86_64
RHSA-2023:3408 Moderate/Sec.  openssl-devel-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4304  Moderate/Sec.  openssl-devel-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4450  Moderate/Sec.  openssl-devel-1:1.1.1k-9.el8_6.x86_64
CVE-2023-0215  Moderate/Sec.  openssl-devel-1:1.1.1k-9.el8_6.x86_64
classification Moderate/Sec.  openssl-devel-1:1.1.1k-9.el8_6.x86_64
RHSA-2023:3408 Moderate/Sec.  openssl-libs-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4304  Moderate/Sec.  openssl-libs-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4450  Moderate/Sec.  openssl-libs-1:1.1.1k-9.el8_6.x86_64
CVE-2023-0215  Moderate/Sec.  openssl-libs-1:1.1.1k-9.el8_6.x86_64
classification Moderate/Sec.  openssl-libs-1:1.1.1k-9.el8_6.x86_64
RHSA-2023:3388 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564  Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378  Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64

8.6.23.05.SP8

The release date of 8.6.23.05.SP8 security patch is 31 May 2023. The estimated run time is around 80 minutes.

The 8.6.23.05.SP8 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.05.SP8 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command, which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.05.SP8, the upgrade might fail with the following error:
  • 1. McpUpgrader.install
            Upgrade Detail: Component install for mcp
            Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
            Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
    
    
    Workaround:
    1. Run the following command to extract RPMs:
      cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
      
    2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
      
    3. Install the copied node-os*.rpm.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
      
    4. Rerun the same apupgrade command that failed:
      apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
      
The list of Red Hat CVEs which are patched in this release:
RHSA-2023:1842 Moderate/Sec.  curl-7.61.1-22.el8_6.6.x86_64
CVE-2023-23916 Moderate/Sec.  curl-7.61.1-22.el8_6.6.x86_64
classification Moderate/Sec.  curl-7.61.1-22.el8_6.6.x86_64
RHSA-2023:1931 Important/Sec. emacs-filesystem-1:26.1-7.el8_6.1.noarch
CVE-2023-28617 Important/Sec. emacs-filesystem-1:26.1-7.el8_6.1.noarch
classification Important/Sec. emacs-filesystem-1:26.1-7.el8_6.1.noarch
RHSA-2023:1841 Important/Sec. kernel-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-core-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-core-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-devel-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-devel-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-headers-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-headers-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-modules-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-modules-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-tools-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-tools-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1842 Moderate/Sec.  libcurl-7.61.1-22.el8_6.6.x86_64
CVE-2023-23916 Moderate/Sec.  libcurl-7.61.1-22.el8_6.6.x86_64
classification Moderate/Sec.  libcurl-7.61.1-22.el8_6.6.x86_64
RHSA-2023:2136 Important/Sec. libsmbclient-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. libsmbclient-4.15.5-12.el8_6.x86_64
classification Important/Sec. libsmbclient-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. libwbclient-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. libwbclient-4.15.5-12.el8_6.x86_64
classification Important/Sec. libwbclient-4.15.5-12.el8_6.x86_64
RHSA-2023:1841 Important/Sec. perf-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. perf-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. python3-perf-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461  Important/Sec. python3-perf-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:2136 Important/Sec. python3-samba-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. python3-samba-4.15.5-12.el8_6.x86_64
classification Important/Sec. python3-samba-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-client-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-client-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-client-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-client-libs-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-client-libs-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-client-libs-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-common-4.15.5-12.el8_6.noarch
CVE-2022-38023 Important/Sec. samba-common-4.15.5-12.el8_6.noarch
classification Important/Sec. samba-common-4.15.5-12.el8_6.noarch
RHSA-2023:2136 Important/Sec. samba-common-libs-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-common-libs-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-common-libs-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-common-tools-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-common-tools-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-common-tools-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-libs-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-libs-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-libs-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-winbind-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-winbind-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-winbind-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-winbind-modules-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-winbind-modules-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-winbind-modules-4.15.5-12.el8_6.x86_64

8.6.23.04.SP7

The release date of 8.6.23.04.SP7 security patch is 27 April 2023. The estimated run time is around 80 minutes.

The 8.6.23.04.SP7 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.04.SP7 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.04.SP7, the upgrade might fail with the following error:
  • 1. McpUpgrader.install
            Upgrade Detail: Component install for mcp
            Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
            Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
    
    
    Workaround:
    1. Run the following command to extract RPMs:
      cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
      
    2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
      
    3. Install the copied node-os*.rpm.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
      
    4. Rerun the same apupgrade command that failed:
      apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
      
The list of Red Hat CVEs which are patched in this release:
RHSA-2023:1554 Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1441 Important/Sec. openssl-1:1.1.1k-8.el8_6.x86_64
CVE-2023-0286  Important/Sec. openssl-1:1.1.1k-8.el8_6.x86_64
classification Important/Sec. openssl-1:1.1.1k-8.el8_6.x86_64
RHSA-2023:1441 Important/Sec. openssl-devel-1:1.1.1k-8.el8_6.x86_64
CVE-2023-0286  Important/Sec. openssl-devel-1:1.1.1k-8.el8_6.x86_64
classification Important/Sec. openssl-devel-1:1.1.1k-8.el8_6.x86_64
RHSA-2023:1441 Important/Sec. openssl-libs-1:1.1.1k-8.el8_6.x86_64
CVE-2023-0286  Important/Sec. openssl-libs-1:1.1.1k-8.el8_6.x86_64
classification Important/Sec. openssl-libs-1:1.1.1k-8.el8_6.x86_64
RHSA-2023:1554 Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266  Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386  Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64

8.6.23.03.SP6

The release date of 8.6.23.03.SP6 security patch is 30 March 2023. The estimated run time is around 70 minutes.

The 8.6.23.03.SP6 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.03.SP6 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.03.SP6, the upgrade might fail with the following error:
  • 1. McpUpgrader.install
            Upgrade Detail: Component install for mcp
            Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
            Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
    
    
    Workaround:
    1. Run the following command to extract RPMs:
      cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
      
    2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
      
    3. Install the copied node-os*.rpm.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
      
    4. Rerun the same apupgrade command that failed:
      apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
      
The list of Red Hat CVEs which are patched in this release:
RHSA-2023:1130 Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964  Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269  Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64

8.6.23.02.SP5

The release date of 8.6.23.02.SP5 security patch is 22 February 2023. The estimated run time is around 80 minutes.

The 8.6.23.02.SP5 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.02.SP5 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.02.SP5, the upgrade might fail with the following error:
  • 1. McpUpgrader.install
            Upgrade Detail: Component install for mcp
            Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
            Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
    
    
    Workaround:
    1. Run the following command to extract RPMs:
      cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
      
    2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
      
    3. Install the copied node-os*.rpm.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
      
    4. Rerun the same apupgrade command that failed:
      apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
      
The list of Red Hat CVEs which are patched in this release:
RHSA-2023:0440 Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0594 Important/Sec. libksba-1.3.5-9.el8_6.x86_64
CVE-2022-47629 Important/Sec. libksba-1.3.5-9.el8_6.x86_64
classification Important/Sec. libksba-1.3.5-9.el8_6.x86_64
RHSA-2023:0440 Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139  Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
ref_0          Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0283 Important/Sec. sudo-1.8.29-8.el8_6.1.x86_64
CVE-2023-22809 Important/Sec. sudo-1.8.29-8.el8_6.1.x86_64
classification Important/Sec. sudo-1.8.29-8.el8_6.1.x86_64

8.6.23.01.SP4

The release date of 8.6.23.01.SP4 security patch is 31 January 2023. The estimated run time is around 80 minutes.

The 8.6.23.01.SP4 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.23.01.SP4 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.01.SP4, the upgrade might fail with the following error:
  • 1. McpUpgrader.install
            Upgrade Detail: Component install for mcp
            Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
            Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
    
    
    Workaround:
    1. Run the following command to extract RPMs:
      cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
      
    2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
      
    3. Install the copied node-os*.rpm.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
      
    4. Rerun the same apupgrade command that failed:
      apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
      
The list of Red Hat CVEs patched in this release:
RHSA-2022:8812 Moderate/Sec.  dbus-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec.  dbus-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec.  dbus-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec.  dbus-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec.  dbus-1:1.12.8-18.el8_6.2.x86_64
RHSA-2022:8812 Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.2.noarch
CVE-2022-42010 Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.2.noarch
CVE-2022-42011 Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.2.noarch
CVE-2022-42012 Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.2.noarch
classification Moderate/Sec.  dbus-common-1:1.12.8-18.el8_6.2.noarch
RHSA-2022:8812 Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec.  dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
RHSA-2022:8812 Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec.  dbus-libs-1:1.12.8-18.el8_6.2.x86_64
RHSA-2022:8812 Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec.  dbus-tools-1:1.12.8-18.el8_6.2.x86_64
RHSA-2023:0048 Moderate/Sec.  grub2-common-1:2.02-123.el8_6.12.noarch
CVE-2022-2601  Moderate/Sec.  grub2-common-1:2.02-123.el8_6.12.noarch
CVE-2022-3775  Moderate/Sec.  grub2-common-1:2.02-123.el8_6.12.noarch
classification Moderate/Sec.  grub2-common-1:2.02-123.el8_6.12.noarch
RHSA-2023:0048 Moderate/Sec.  grub2-pc-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601  Moderate/Sec.  grub2-pc-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775  Moderate/Sec.  grub2-pc-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec.  grub2-pc-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec.  grub2-pc-modules-1:2.02-123.el8_6.12.noarch
CVE-2022-2601  Moderate/Sec.  grub2-pc-modules-1:2.02-123.el8_6.12.noarch
CVE-2022-3775  Moderate/Sec.  grub2-pc-modules-1:2.02-123.el8_6.12.noarch
classification Moderate/Sec.  grub2-pc-modules-1:2.02-123.el8_6.12.noarch
RHSA-2023:0048 Moderate/Sec.  grub2-tools-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601  Moderate/Sec.  grub2-tools-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775  Moderate/Sec.  grub2-tools-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec.  grub2-tools-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec.  grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601  Moderate/Sec.  grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775  Moderate/Sec.  grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec.  grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec.  grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601  Moderate/Sec.  grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775  Moderate/Sec.  grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec.  grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec.  grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601  Moderate/Sec.  grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775  Moderate/Sec.  grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec.  grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
RHSA-2022:8809 Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158  Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639  Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64

8.6.22.12.SP3

The release date of 8.6.22.12.SP3 security patch is 6 January 2023.The estimated run time is around 80 minutes. This security patch includes the list of CVEs for November and December 2022.

The 8.6.22.12.SP3 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.22.12.SP3 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.22.12.SP3, the upgrade might fail with the following error:
  • 1. McpUpgrader.install
            Upgrade Detail: Component install for mcp
            Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py'
            Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
    
    
    Workaround:
    1. Run the following command to extract RPMs:
      cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
      
    2. Copy node-os*.rpm from the 2.0.2.1 bundle to /tmp on all control nodes.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
      
    3. Install the copied node-os*.rpm.
      for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
      
    4. Rerun the same apupgrade command that failed:
      apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
      
The list of Red Hat CVEs patched in this release:
RHSA-2022:7192 Important/Sec. device-mapper-multipath-0.8.4-22.el8_6.2.x86_64
CVE-2022-41974 Important/Sec. device-mapper-multipath-0.8.4-22.el8_6.2.x86_64
classification Important/Sec. device-mapper-multipath-0.8.4-22.el8_6.2.x86_64
RHSA-2022:7192 Important/Sec. device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64
CVE-2022-41974 Important/Sec. device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64
classification Important/Sec. device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64
RHSA-2022:7105 Moderate/Sec.  gnutls-3.6.16-5.el8_6.x86_64
CVE-2022-2509  Moderate/Sec.  gnutls-3.6.16-5.el8_6.x86_64
classification Moderate/Sec.  gnutls-3.6.16-5.el8_6.x86_64
RHSA-2022:7105 Moderate/Sec.  gnutls-c++-3.6.16-5.el8_6.x86_64
CVE-2022-2509  Moderate/Sec.  gnutls-c++-3.6.16-5.el8_6.x86_64
classification Moderate/Sec.  gnutls-c++-3.6.16-5.el8_6.x86_64
RHSA-2022:7105 Moderate/Sec.  gnutls-dane-3.6.16-5.el8_6.x86_64
CVE-2022-2509  Moderate/Sec.  gnutls-dane-3.6.16-5.el8_6.x86_64
classification Moderate/Sec.  gnutls-dane-3.6.16-5.el8_6.x86_64
RHSA-2022:7105 Moderate/Sec.  gnutls-utils-3.6.16-5.el8_6.x86_64
CVE-2022-2509  Moderate/Sec.  gnutls-utils-3.6.16-5.el8_6.x86_64
classification Moderate/Sec.  gnutls-utils-3.6.16-5.el8_6.x86_64
RHSA-2022:7006 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21619 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21624 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21626 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21628 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
classification Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
RHSA-2022:7006 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21619 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21624 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21626 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21628 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
classification Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7192 Important/Sec. kpartx-0.8.4-22.el8_6.2.x86_64
CVE-2022-41974 Important/Sec. kpartx-0.8.4-22.el8_6.2.x86_64
classification Important/Sec. kpartx-0.8.4-22.el8_6.2.x86_64
RHSA-2022:7089 Important/Sec. libksba-1.3.5-8.el8_6.x86_64
CVE-2022-3515  Important/Sec. libksba-1.3.5-8.el8_6.x86_64
classification Important/Sec. libksba-1.3.5-8.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  libsmbclient-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  libsmbclient-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  libsmbclient-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  libwbclient-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  libwbclient-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  libwbclient-4.15.5-10.el8_6.x86_64
RHSA-2022:7110 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494  Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353  Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588  Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  python3-samba-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  python3-samba-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  python3-samba-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-client-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-client-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-client-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-client-libs-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-client-libs-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-client-libs-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-common-4.15.5-10.el8_6.noarch
CVE-2022-32742 Moderate/Sec.  samba-common-4.15.5-10.el8_6.noarch
classification Moderate/Sec.  samba-common-4.15.5-10.el8_6.noarch
RHSA-2022:7111 Moderate/Sec.  samba-common-libs-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-common-libs-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-common-libs-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-common-tools-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-common-tools-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-common-tools-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-libs-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-libs-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-libs-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-winbind-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-winbind-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-winbind-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec.  samba-winbind-modules-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec.  samba-winbind-modules-4.15.5-10.el8_6.x86_64
classification Moderate/Sec.  samba-winbind-modules-4.15.5-10.el8_6.x86_64
RHSA-2022:7108 Moderate/Sec.  sqlite-3.26.0-16.el8_6.x86_64
CVE-2020-35525 Moderate/Sec.  sqlite-3.26.0-16.el8_6.x86_64
CVE-2020-35527 Moderate/Sec.  sqlite-3.26.0-16.el8_6.x86_64
classification Moderate/Sec.  sqlite-3.26.0-16.el8_6.x86_64
RHSA-2022:7108 Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.x86_64
CVE-2020-35525 Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.x86_64
CVE-2020-35527 Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.x86_64
classification Moderate/Sec.  sqlite-libs-3.26.0-16.el8_6.x86_64
RHSA-2022:7106 Moderate/Sec.  zlib-1.2.11-19.el8_6.x86_64
CVE-2022-37434 Moderate/Sec.  zlib-1.2.11-19.el8_6.x86_64
classification Moderate/Sec.  zlib-1.2.11-19.el8_6.x86_64
RHSA-2022:7106 Moderate/Sec.  zlib-devel-1.2.11-19.el8_6.x86_64
CVE-2022-37434 Moderate/Sec.  zlib-devel-1.2.11-19.el8_6.x86_64
classification Moderate/Sec.  zlib-devel-1.2.11-19.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-devel-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-devel-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-devel-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-libs-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-libs-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-libs-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-pkinit-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-pkinit-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-pkinit-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-server-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-server-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-server-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-workstation-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-workstation-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-workstation-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. libkadm5-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. libkadm5-1.18.2-15.el8_6.x86_64
classification Important/Sec. libkadm5-1.18.2-15.el8_6.x86_64
CVE-2021-29740   gpfs.adv-5.1.2-7.x86_64

8.6.22.10.SP2

The release date of 8.6.22.10.SP2 security patch is 26 October 2022. The estimated run time is around 120 minutes.

The 8.6.22.10.SP2 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.

Note:
During 8.6.22.10.SP2 security patch application, you might run into the following errors:
  • apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
    Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
    
    Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
    Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
    <class 'Exception'>
    due to a mismatch in the RHEL versions.
    Workaround:
    • From e1n1, run the following commands to patch the code in the existing scripts:
      1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
      3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
      4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    • FATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
      This error happens after apupgrade starts the system, brings it to Ready state and then runs the oc login command. When apupgrade terminates with a timeout, oc login seems to be working manually and after you restart the apupgrade, the same oc login command works.
      Workaround:
      1. Wait for apupgrade to time out.
      2. Run oc login command which is written in the log. For example:
        oc login -u system:admin -n default https://api.localcluster.fbond:6443
      3. Restart the upgrade.
The list of Red Hat CVEs patched in this release:
RHSA-2022:6778 Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38177 Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38178 Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
classification Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
RHSA-2022:6778 Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6878 Important/Sec. expat-2.2.5-8.el8_6.3.x86_64
CVE-2022-40674 Important/Sec. expat-2.2.5-8.el8_6.3.x86_64
classification Important/Sec. expat-2.2.5-8.el8_6.3.x86_64
RHSA-2022:6463 Moderate/Sec.  gnupg2-2.2.20-3.el8_6.x86_64
CVE-2022-34903 Moderate/Sec.  gnupg2-2.2.20-3.el8_6.x86_64
classification Moderate/Sec.  gnupg2-2.2.20-3.el8_6.x86_64
RHSA-2022:6463 Moderate/Sec.  gnupg2-smime-2.2.20-3.el8_6.x86_64
CVE-2022-34903 Moderate/Sec.  gnupg2-smime-2.2.20-3.el8_6.x86_64
classification Moderate/Sec.  gnupg2-smime-2.2.20-3.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-core-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-core-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-core-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-core-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-core-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-devel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-devel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-devel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-devel-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-devel-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-headers-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-headers-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-headers-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-headers-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-headers-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-modules-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-modules-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-modules-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-modules-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-modules-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-tools-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-tools-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-tools-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-tools-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-tools-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6443 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46659 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46661 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46663 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46664 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46665 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46668 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46669 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-21427 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24048 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24050 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24051 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24052 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27376 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27377 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27378 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27379 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27380 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27381 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27383 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27384 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27386 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27387 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27445 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27447 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27448 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27449 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27452 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27456 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27458 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31622 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31623 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32083 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32085 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32087 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32088 Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
classification Moderate/Sec.  mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
RHSA-2022:6443 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46659 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46661 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46663 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46664 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46665 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46668 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46669 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-21427 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24048 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24050 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24051 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24052 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27376 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27377 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27378 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27379 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27380 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27381 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27383 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27384 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27386 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27387 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27445 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27447 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27448 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27449 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27452 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27456 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27458 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31622 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31623 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32083 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32085 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32087 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32088 Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
classification Moderate/Sec.  mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
RHSA-2022:6460 Moderate/Sec.  perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  perf-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  perf-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6457 Moderate/Sec.  platform-python-3.6.8-47.el8_6.x86_64
CVE-2015-20107 Moderate/Sec.  platform-python-3.6.8-47.el8_6.x86_64
CVE-2022-0391  Moderate/Sec.  platform-python-3.6.8-47.el8_6.x86_64
classification Moderate/Sec.  platform-python-3.6.8-47.el8_6.x86_64
RHSA-2022:6457 Moderate/Sec.  platform-python-devel-3.6.8-47.el8_6.x86_64
CVE-2015-20107 Moderate/Sec.  platform-python-devel-3.6.8-47.el8_6.x86_64
CVE-2022-0391  Moderate/Sec.  platform-python-devel-3.6.8-47.el8_6.x86_64
classification Moderate/Sec.  platform-python-devel-3.6.8-47.el8_6.x86_64
RHSA-2022:6778 Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38177 Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38178 Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
classification Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
RHSA-2022:6457 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.x86_64
CVE-2015-20107 Moderate/Sec.  python3-libs-3.6.8-47.el8_6.x86_64
CVE-2022-0391  Moderate/Sec.  python3-libs-3.6.8-47.el8_6.x86_64
classification Moderate/Sec.  python3-libs-3.6.8-47.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec.  python3-perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec.  python3-perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec.  python3-perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec.  python3-perf-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec.  python3-perf-4.18.0-372.26.1.el8_6.x86_64

8.6.22.09.SP1

Security patch released in September 2022. The estimated run time is around 120 minutes.

The 8.6.22.09.SP1 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
Note: When you apply 8.6.22.09.SP1 on 2.0.2 version, the upgrade might fail with the following error:
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log

Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
due to a mismatch in the RHEL versions.

Workaround:

  • From e1n1, run the following commands to patch the code in the existing scripts:
    1. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
    2. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
    3. sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
    4. sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
The list of Red Hat CVEs patched in this release:
RHSA-2022:5326 Low/Sec.       compat-openssl10-1:1.0.2o-4.el8_6.x86_64
CVE-2022-0778  Low/Sec.       compat-openssl10-1:1.0.2o-4.el8_6.x86_64
classification Low/Sec.       compat-openssl10-1:1.0.2o-4.el8_6.x86_64
RHSA-2022:5313 Moderate/Sec.  curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-22576 Moderate/Sec.  curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27774 Moderate/Sec.  curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27776 Moderate/Sec.  curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27782 Moderate/Sec.  curl-7.61.1-22.el8_6.3.x86_64
classification Moderate/Sec.  curl-7.61.1-22.el8_6.3.x86_64
RHSA-2022:6159 Moderate/Sec.  curl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32206 Moderate/Sec.  curl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32208 Moderate/Sec.  curl-7.61.1-22.el8_6.4.x86_64
classification Moderate/Sec.  curl-7.61.1-22.el8_6.4.x86_64
RHSA-2022:5314 Moderate/Sec.  expat-2.2.5-8.el8_6.2.x86_64
CVE-2022-25313 Moderate/Sec.  expat-2.2.5-8.el8_6.2.x86_64
CVE-2022-25314 Moderate/Sec.  expat-2.2.5-8.el8_6.2.x86_64
classification Moderate/Sec.  expat-2.2.5-8.el8_6.2.x86_64
RHSA-2022:5095 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2021-3695  Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2021-3696  Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2021-3697  Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28733 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28734 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28735 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28736 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28737 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
classification Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
RHSA-2022:5095 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695  Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696  Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697  Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2021-3695  Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2021-3696  Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2021-3697  Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28733 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28734 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28735 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28736 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28737 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
classification Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
RHSA-2022:5095 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695  Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696  Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697  Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695  Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696  Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697  Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695  Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696  Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697  Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695  Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696  Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697  Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5163 Low/Sec.       httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec.       httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec.       httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2022:5163 Low/Sec.       httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2.noarch
CVE-2020-13950 Low/Sec.       httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2.noarch
classification Low/Sec.       httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2.noarch
RHSA-2022:5163 Low/Sec.       httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec.       httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec.       httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2020:0981 Important/Sec. ipmitool-1.8.18-12.el8_1.x86_64
CVE-2020-5208  Important/Sec. ipmitool-1.8.18-12.el8_1.x86_64
classification Important/Sec. ipmitool-1.8.18-12.el8_1.x86_64
RHSA-2022:5696 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21540 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21541 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-34169 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
RHSA-2022:5696 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21540 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21541 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-34169 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5313 Moderate/Sec.  libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-22576 Moderate/Sec.  libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27774 Moderate/Sec.  libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27776 Moderate/Sec.  libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27782 Moderate/Sec.  libcurl-7.61.1-22.el8_6.3.x86_64
classification Moderate/Sec.  libcurl-7.61.1-22.el8_6.3.x86_64
RHSA-2022:6159 Moderate/Sec.  libcurl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32206 Moderate/Sec.  libcurl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32208 Moderate/Sec.  libcurl-7.61.1-22.el8_6.4.x86_64
classification Moderate/Sec.  libcurl-7.61.1-22.el8_6.4.x86_64
RHSA-2022:5311 Moderate/Sec.  libgcrypt-1.8.5-7.el8_6.x86_64
CVE-2021-40528 Moderate/Sec.  libgcrypt-1.8.5-7.el8_6.x86_64
classification Moderate/Sec.  libgcrypt-1.8.5-7.el8_6.x86_64
RHSA-2022:5331 Moderate/Sec.  libinput-1.16.3-3.el8_6.x86_64
CVE-2022-1215  Moderate/Sec.  libinput-1.16.3-3.el8_6.x86_64
classification Moderate/Sec.  libinput-1.16.3-3.el8_6.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec.  libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206  Moderate/Sec.  libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207  Moderate/Sec.  libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec.  libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec.  libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec.  libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5317 Moderate/Sec.  libxml2-2.9.7-13.el8_6.1.x86_64
CVE-2022-29824 Moderate/Sec.  libxml2-2.9.7-13.el8_6.1.x86_64
classification Moderate/Sec.  libxml2-2.9.7-13.el8_6.1.x86_64
RHSA-2022:5163 Low/Sec.       mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec.       mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec.       mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2022:5163 Low/Sec.       mod_ssl-1:2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec.       mod_ssl-1:2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec.       mod_ssl-1:2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2022:5095 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2021-3695  Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2021-3696  Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2021-3697  Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28733 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28734 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28735 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28736 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28737 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
classification Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
RHSA-2022:5818 Moderate/Sec.  openssl-1:1.1.1k-7.el8_6.x86_64
CVE-2022-1292  Moderate/Sec.  openssl-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2068  Moderate/Sec.  openssl-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2097  Moderate/Sec.  openssl-1:1.1.1k-7.el8_6.x86_64
classification Moderate/Sec.  openssl-1:1.1.1k-7.el8_6.x86_64
RHSA-2022:5818 Moderate/Sec.  openssl-devel-1:1.1.1k-7.el8_6.x86_64
CVE-2022-1292  Moderate/Sec.  openssl-devel-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2068  Moderate/Sec.  openssl-devel-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2097  Moderate/Sec.  openssl-devel-1:1.1.1k-7.el8_6.x86_64
classification Moderate/Sec.  openssl-devel-1:1.1.1k-7.el8_6.x86_64
RHSA-2022:5818 Moderate/Sec.  openssl-libs-1:1.1.1k-7.el8_6.x86_64
CVE-2022-1292  Moderate/Sec.  openssl-libs-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2068  Moderate/Sec.  openssl-libs-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2097  Moderate/Sec.  openssl-libs-1:1.1.1k-7.el8_6.x86_64
classification Moderate/Sec.  openssl-libs-1:1.1.1k-7.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec.  pcre2-10.32-3.el8_6.x86_64
CVE-2022-1586  Moderate/Sec.  pcre2-10.32-3.el8_6.x86_64
classification Moderate/Sec.  pcre2-10.32-3.el8_6.x86_64
ref_0          Moderate/Sec.  pcre2-10.32-3.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec.  pcre2-devel-10.32-3.el8_6.x86_64
CVE-2022-1586  Moderate/Sec.  pcre2-devel-10.32-3.el8_6.x86_64
classification Moderate/Sec.  pcre2-devel-10.32-3.el8_6.x86_64
ref_0          Moderate/Sec.  pcre2-devel-10.32-3.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec.  pcre2-utf16-10.32-3.el8_6.x86_64
CVE-2022-1586  Moderate/Sec.  pcre2-utf16-10.32-3.el8_6.x86_64
classification Moderate/Sec.  pcre2-utf16-10.32-3.el8_6.x86_64
ref_0          Moderate/Sec.  pcre2-utf16-10.32-3.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec.  pcre2-utf32-10.32-3.el8_6.x86_64
CVE-2022-1586  Moderate/Sec.  pcre2-utf32-10.32-3.el8_6.x86_64
classification Moderate/Sec.  pcre2-utf32-10.32-3.el8_6.x86_64
ref_0          Moderate/Sec.  pcre2-utf32-10.32-3.el8_6.x86_64
RHSA-2022:5819 Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5317 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.1.x86_64
CVE-2022-29824 Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.1.x86_64
classification Moderate/Sec.  python3-libxml2-2.9.7-13.el8_6.1.x86_64
RHSA-2022:5819 Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012  Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206  Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207  Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:6180 Important/Sec. rsync-3.1.3-14.el8_6.3.x86_64
CVE-2022-29154 Important/Sec. rsync-3.1.3-14.el8_6.3.x86_64
classification Important/Sec. rsync-3.1.3-14.el8_6.3.x86_64
RHSA-2022:6180 Important/Sec. rsync-daemon-3.1.3-14.el8_6.3.noarch
CVE-2022-29154 Important/Sec. rsync-daemon-3.1.3-14.el8_6.3.noarch
classification Important/Sec. rsync-daemon-3.1.3-14.el8_6.3.noarch
RHSA-2022:5779 Moderate/Sec.  ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
CVE-2021-41817 Moderate/Sec.  ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
CVE-2021-41819 Moderate/Sec.  ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
classification Moderate/Sec.  ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
RHSA-2022:6206 Important/Sec. systemd-239-58.el8_6.4.x86_64
CVE-2022-2526  Important/Sec. systemd-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-container-239-58.el8_6.4.x86_64
CVE-2022-2526  Important/Sec. systemd-container-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-container-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-libs-239-58.el8_6.4.x86_64
CVE-2022-2526  Important/Sec. systemd-libs-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-libs-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-pam-239-58.el8_6.4.x86_64
CVE-2022-2526  Important/Sec. systemd-pam-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-pam-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-udev-239-58.el8_6.4.x86_64
CVE-2022-2526  Important/Sec. systemd-udev-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-udev-239-58.el8_6.4.x86_64
RHSA-2022:5319 Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1621  Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1629  Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.2.x86_64
classification Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.2.x86_64
RHSA-2022:5813 Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1785  Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1897  Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1927  Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.4.x86_64
classification Moderate/Sec.  vim-common-2:8.0.1763-19.el8_6.4.x86_64
RHSA-2022:5319 Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1621  Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1629  Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
classification Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
RHSA-2022:5813 Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1785  Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1897  Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1927  Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
classification Moderate/Sec.  vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
RHSA-2022:5319 Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
CVE-2022-1621  Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.2.noarch 
CVE-2022-1629  Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
classification Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
RHSA-2022:5813 Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
CVE-2022-1785  Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
CVE-2022-1897  Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
CVE-2022-1927  Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
classification Moderate/Sec.  vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
RHSA-2022:5319 Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1621  Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1629  Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
classification Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
RHSA-2022:5813 Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1785  Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1897  Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1927  Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
classification Moderate/Sec.  vim-minimal-2:8.0.1763-19.el8_6.4.x86_64