Security patch release notes
Review the release notes for security patches for 2.0.x Cloud Pak for Data System.
Security patches are tied to the version of Red Hat Linux that is installed on Cloud Pak for Data System.
The patches for a specific Red Hat release are cumulative. For example, if your system is on 8.6, you only need to install the latest patch that applies to 8.6, there is no need to install all of them one by one.
Verify that which patch can be installed on your system. Do not apply the patch if the Red Hat Linux version on your system does not match.
For installation, see Applying security patches. Downtime is required when installing the security patch.
8.8.24.08.SP20
The release date of the 8.8.24.08.SP20 security patch is 4 September 2024. The estimated run time is around 60 minutes.
RHSA-2024:4580 Moderate/Sec. cups-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4580 Moderate/Sec. cups-client-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-client-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-client-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4580 Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.4.noarch
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.4.noarch
classification Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.4.noarch
RHSA-2024:4580 Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4580 Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.4.x86_64
CVE-2024-35235 (RHSA-2024:4580) Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.4.x86_64
classification Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.4.x86_64
RHSA-2024:4747 Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.4.noarch
CVE-2024-1298 (RHSA-2024:4747) Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.4.noarch
classification Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.4.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.7.x86_64
classification Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.7.x86_64
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.7.x86_64
RHSA-2024:4746 Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.7.x86_64
classification Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.7.x86_64
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.7.x86_64
RHSA-2024:4746 Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.7.x86_64
classification Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.7.x86_64
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.7.x86_64
RHSA-2024:4746 Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.7.noarch
RHSA-2024:4746 Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.7.noarch
classification Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.7.noarch
CVE-2024-37891 (RHSA-2024:4746) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.7.noarch
RHSA-2024:4527 Important/Sec. ghostscript-9.27-6.el8_8.1.x86_64
CVE-2024-33871 (RHSA-2024:4527) Important/Sec. ghostscript-9.27-6.el8_8.1.x86_64
classification Important/Sec. ghostscript-9.27-6.el8_8.1.x86_64
RHSA-2024:4579 Important/Sec. git-2.39.5-1.el8_8.x86_64
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-2.39.5-1.el8_8.x86_64
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-2.39.5-1.el8_8.x86_64
classification Important/Sec. git-2.39.5-1.el8_8.x86_64
RHSA-2024:4579 Important/Sec. git-core-2.39.5-1.el8_8.x86_64
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-core-2.39.5-1.el8_8.x86_64
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-core-2.39.5-1.el8_8.x86_64
classification Important/Sec. git-core-2.39.5-1.el8_8.x86_64
RHSA-2024:4579 Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
classification Important/Sec. git-core-doc-2.39.5-1.el8_8.noarch
RHSA-2024:4579 Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
classification Important/Sec. git-subtree-2.39.5-1.el8_8.x86_64
RHSA-2024:4719 Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. httpd-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4719 Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
classification Important/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch
RHSA-2024:4719 Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. httpd-tools-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4741 Moderate/Sec. iwl100-firmware-39.31.5.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl100-firmware-39.31.5.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl100-firmware-39.31.5.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl1000-firmware-1:39.31.5.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl1000-firmware-1:39.31.5.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl1000-firmware-1:39.31.5.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl105-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl105-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl105-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl135-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl135-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl135-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl2000-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl2000-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl2000-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl2030-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl2030-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl2030-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl3160-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl3160-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl3160-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl3945-firmware-15.32.2.9-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl3945-firmware-15.32.2.9-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl3945-firmware-15.32.2.9-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl4965-firmware-228.61.2.24-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl4965-firmware-228.61.2.24-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl4965-firmware-228.61.2.24-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl5000-firmware-8.83.5.1_1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl5000-firmware-8.83.5.1_1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl5000-firmware-8.83.5.1_1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl5150-firmware-8.24.2.2-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl5150-firmware-8.24.2.2-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl5150-firmware-8.24.2.2-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6000-firmware-9.221.4.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6000-firmware-9.221.4.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6000-firmware-9.221.4.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl6050-firmware-41.28.5.1-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl6050-firmware-41.28.5.1-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl6050-firmware-41.28.5.1-118.1.el8_8.1.noarch
RHSA-2024:4741 Moderate/Sec. iwl7260-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. iwl7260-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
classification Moderate/Sec. iwl7260-firmware-1:25.30.13.0-118.1.el8_8.1.noarch
RHSA-2024:4563 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:4563 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147 (RHSA-2024:4563) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-core-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4740 Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-server-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4743 Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4369 Important/Sec. less-530-3.el8_8.x86_64
CVE-2024-32487 (RHSA-2024:4369) Important/Sec. less-530-3.el8_8.x86_64
classification Important/Sec. less-530-3.el8_8.x86_64
RHSA-2024:4527 Important/Sec. libgs-9.27-6.el8_8.1.x86_64
CVE-2024-33871 (RHSA-2024:4527) Important/Sec. libgs-9.27-6.el8_8.1.x86_64
classification Important/Sec. libgs-9.27-6.el8_8.1.x86_64
RHSA-2024:4743 Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
CVE-2024-37370 (RHSA-2024:4743) Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
CVE-2024-37371 (RHSA-2024:4743) Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
classification Moderate/Sec. libkadm5-1.18.2-26.el8_8.2.x86_64
RHSA-2024:4641 Important/Sec. libndp-1.7-7.el8_8.x86_64
CVE-2024-5564 (RHSA-2024:4641) Important/Sec. libndp-1.7-7.el8_8.x86_64
classification Important/Sec. libndp-1.7-7.el8_8.x86_64
RHSA-2024:4741 Moderate/Sec. linux-firmware-20240610-118.1.git90df68d2.el8_8.noarch
CVE-2023-31346 (RHSA-2024:4741) Moderate/Sec. linux-firmware-20240610-118.1.git90df68d2.el8_8.noarch
classification Moderate/Sec. linux-firmware-20240610-118.1.git90df68d2.el8_8.noarch
RHSA-2024:4719 Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. mod_session-2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4719 Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38474 (RHSA-2024:4719) Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38475 (RHSA-2024:4719) Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
CVE-2024-38477 (RHSA-2024:4719) Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
classification Important/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64
RHSA-2024:4740 Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. perf-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:4579 Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
CVE-2024-32002 (RHSA-2024:4579) Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
CVE-2024-32004 (RHSA-2024:4579) Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
classification Important/Sec. perl-Git-2.39.5-1.el8_8.noarch
RHSA-2024:5000 Important/Sec. platform-python-setuptools-39.2.0-7.el8_8.1.noarch
CVE-2024-6345 (RHSA-2024:6345) Important/Sec. platform-python-setuptools-39.2.0-7.el8_8.1.noarch
classification Important/Sec. platform-python-setuptools-39.2.0-7.el8_8.1.noarch
RHSA-2024:4740 Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47310 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47311 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2021-47548 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-1989 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-4155 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52530 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52639 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2023-52667 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26598 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26656 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26735 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26801 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-26804 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-27397 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35937 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35958 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
CVE-2024-35960 (RHSA-2024:4740) Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
classification Moderate/Sec. python3-perf-4.18.0-477.64.1.el8_8.x86_64
RHSA-2024:5000 Important/Sec. python3-setuptools-39.2.0-7.el8_8.1.noarch
CVE-2024-6345 (RHSA-2024:5000) Important/Sec. python3-setuptools-39.2.0-7.el8_8.1.noarch
classification Important/Sec. python3-setuptools-39.2.0-7.el8_8.1.noarch
RHSA-2024:5000 Important/Sec. python3-setuptools-wheel-39.2.0-7.el8_8.1.noarch
CVE-2024-6345 (RHSA-2024:5000) Important/Sec. python3-setuptools-wheel-39.2.0-7.el8_8.1.noarch
classification Important/Sec. python3-setuptools-wheel-39.2.0-7.el8_8.1.noarch
RHSA-2024:4372 Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4372 Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
CVE-2024-4467 (RHSA-2024:4372) Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
classification Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+22024+abee0a73.5.x86_64
RHSA-2024:4639 Important/Sec. qt5-qtbase-5.15.3-2.el8_8.x86_64
CVE-2024-39936 (RHSA-2024:4639) Important/Sec. qt5-qtbase-5.15.3-2.el8_8.x86_64
classification Important/Sec. qt5-qtbase-5.15.3-2.el8_8.x86_64
RHSA-2024:4639 Important/Sec. qt5-qtbase-common-5.15.3-2.el8_8.noarch
CVE-2024-39936 (RHSA-2024:4639) Important/Sec. qt5-qtbase-common-5.15.3-2.el8_8.noarch
classification Important/Sec. qt5-qtbase-common-5.15.3-2.el8_8.noarch
RHSA-2024:4639 Important/Sec. qt5-qtbase-gui-5.15.3-2.el8_8.x86_64
CVE-2024-39936 (RHSA-2024:4639) Important/Sec. qt5-qtbase-gui-5.15.3-2.el8_8.x86_64
classification Important/Sec. qt5-qtbase-gui-5.15.3-2.el8_8.x86_64
RHSA-2024:4739 Moderate/Sec. tpm2-tss-2.3.2-5.el8_8.x86_64
CVE-2023-22745 (RHSA-2024:4639) Moderate/Sec. tpm2-tss-2.3.2-5.el8_8.x86_64
classification Moderate/Sec. tpm2-tss-2.3.2-5.el8_8.x86_64
8.8.24.07.SP19
The release date of the 8.8.24.07.SP19 security patch is 22 July 2024. The estimated run time is around 60 minutes.
RHSA-2024:3811 Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.6.x86_64
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.6.x86_64
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.6.x86_64
RHSA-2024:3811 Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.6.noarch
classification Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.6.x86_64
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.6.x86_64
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.6.x86_64
RHSA-2024:3811 Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.6.x86_64
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.6.x86_64
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.6.x86_64
RHSA-2024:3811 Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.6.noarch
RHSA-2024:3811 Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.6.noarch
CVE-2024-34064 (RHSA-2024:3811) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.6.noarch
classification (RHSA-2024:3811) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.6.noarch
RHSA-2024:3810 Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-core-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-devel-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-headers-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-modules-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-modules-extra-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-tools-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. kernel-tools-libs-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3701 Moderate/Sec. libnghttp2-1.33.0-5.el8_8.1.x86_64
CVE-2024-28182 (RHSA-2024:3701) Moderate/Sec. libnghttp2-1.33.0-5.el8_8.1.x86_64
classification (RHSA-2024:3701) Moderate/Sec. libnghttp2-1.33.0-5.el8_8.1.x86_64
RHSA-2024:4200 Moderate/Sec. libreswan-4.9-3.el8_8.2.x86_64
CVE-2024-3652 (RHSA-2024:4200) Moderate/Sec. libreswan-4.9-3.el8_8.2.x86_64
classification (RHSA-2024:4200) Moderate/Sec. libreswan-4.9-3.el8_8.2.x86_64
RHSA-2024:3810 Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. perf-4.18.0-477.58.1.el8_8.x86_64
RHSA-2024:3812 Moderate/Sec. protobuf-c-1.3.0-8.el8_8.x86_64
CVE-2022-48468 (RHSA-2024:3812) Moderate/Sec. protobuf-c-1.3.0-8.el8_8.x86_64
classification (RHSA-2024:3812) Moderate/Sec. protobuf-c-1.3.0-8.el8_8.x86_64
RHSA-2024:3810 Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
RHEL-27235 Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2021-47013 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1118 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-1998 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6356 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6535 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-6536 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2023-52578 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25742 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-25743 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26586 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26602 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
CVE-2024-26642 (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
classification (RHSA-2024:3810) Moderate/Sec. python3-perf-4.18.0-477.58.1.el8_8.x86_64
8.8.24.06.SP18
The release date of the 8.8.24.06.SP18 security patch is 17 June 2024. The estimated run time is around 60 minutes.
RHSA-2024:2721 Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-libs-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
classification Important/Sec. bind-license-32:9.11.36-8.el8_8.4.noarch
RHSA-2024:2721 Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:2721 Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
classification Important/Sec. bind-utils-32:9.11.36-8.el8_8.4.x86_64
RHSA-2024:3312 Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
classification Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.11.x86_64
RHSA-2024:2721 Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-client-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:2721 Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
classification Important/Sec. dhcp-common-12:4.3.6-49.el8_8.1.noarch
RHSA-2024:2721 Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-libs-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:2721 Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-relay-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:2721 Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
classification Important/Sec. dhcp-server-12:4.3.6-49.el8_8.1.x86_64
RHSA-2024:3312 Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-all-langpacks-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-common-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-devel-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-gconv-extra-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-headers-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-langpack-en-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-locale-source-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
classification Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
classification Important/Sec. libnsl-2.28-225.el8_8.11.x86_64
RHSA-2024:3303 Moderate/Sec. libxml2-2.9.7-16.el8_8.4.x86_64
CVE-2024-25062 (RHSA-2024:3303) Moderate/Sec. libxml2-2.9.7-16.el8_8.4.x86_64
classification Moderate/Sec. libxml2-2.9.7-16.el8_8.4.x86_64
RHSA-2024:2891 Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
CVE-2023-45802 (RHSA-2024:2891) Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
CVE-2024-27316 (RHSA-2024:2891) Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
classification Moderate/Sec. mod_http2-1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64
RHSA-2024:3312 Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. nscd-2.28-225.el8_8.11.x86_64
classification Important/Sec. nscd-2.28-225.el8_8.11.x86_64
RHSA-2024:3312 Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-2961 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33599 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33600 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33601 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
CVE-2024-33602 (RHSA-2024:3312) Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
classification Important/Sec. nss_db-2.28-225.el8_8.11.x86_64
RHSA-2024:3322 Important/Sec. pcp-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-conf-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-conf-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-conf-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-doc-5.3.7-18.el8_8.noarch
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-doc-5.3.7-18.el8_8.noarch
classification Important/Sec. pcp-doc-5.3.7-18.el8_8.noarch
RHSA-2024:3322 Important/Sec. pcp-gui-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-gui-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-gui-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-libs-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-libs-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-libs-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-pmda-dm-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-pmda-dm-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-pmda-dm-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-pmda-nfsclient-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-pmda-nfsclient-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-pmda-nfsclient-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-pmda-openmetrics-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-pmda-openmetrics-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-pmda-openmetrics-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-selinux-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-selinux-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-selinux-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-system-tools-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-system-tools-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-system-tools-5.3.7-18.el8_8.x86_64
RHSA-2024:3322 Important/Sec. pcp-zeroconf-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. pcp-zeroconf-5.3.7-18.el8_8.x86_64
classification Important/Sec. pcp-zeroconf-5.3.7-18.el8_8.x86_64
RHSA-2024:3391 Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
CVE-2023-6597 (RHSA-2024:3391) Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
CVE-2024-0450 (RHSA-2024:3391) Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
classification Important/Sec. platform-python-3.6.8-51.el8_8.6.x86_64
RHSA-2024:3391 Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
CVE-2023-6597 (RHSA-2024:3391) Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
CVE-2024-0450 (RHSA-2024:3391) Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
classification Important/Sec. platform-python-devel-3.6.8-51.el8_8.6.x86_64
RHSA-2024:2721 Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
CVE-2023-4408 (RHSA-2024:2721) Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50387 (RHSA-2024:2721) Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
CVE-2023-50868 (RHSA-2024:2721) Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
classification Important/Sec. python3-bind-32:9.11.36-8.el8_8.4.noarch
RHSA-2024:3543 Moderate/Sec. python3-idna-2.5-5.el8_8.1.noarch
CVE-2024-3651 (RHSA-2024:3543) Moderate/Sec. python3-idna-2.5-5.el8_8.1.noarch
classification Moderate/Sec. python3-idna-2.5-5.el8_8.1.noarch
RHSA-2024:3391 Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
CVE-2023-6597 (RHSA-2024:3391) Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
CVE-2024-0450 (RHSA-2024:3391) Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
classification Important/Sec. python3-libs-3.6.8-51.el8_8.6.x86_64
RHSA-2024:3303 Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.4.x86_64
CVE-2024-25062 (RHSA-2024:3303) Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.4.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.4.x86_64
RHSA-2024:3322 Important/Sec. python3-pcp-5.3.7-18.el8_8.x86_64
CVE-2024-3019 (RHSA-2024:3322) Important/Sec. python3-pcp-5.3.7-18.el8_8.x86_64
classification Important/Sec. python3-pcp-5.3.7-18.el8_8.x86_64
8.8.24.05.SP17
RHSA-2024:2077 Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
classification Important/Sec. container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch
RHSA-2024:2077 Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. criu-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. criu-libs-3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. crun-1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2575 Moderate/Sec. expat-2.2.5-11.el8_8.2.x86_64
CVE-2023-52425 (RHSA-2024:2575) Moderate/Sec. expat-2.2.5-11.el8_8.2.x86_64
classification Moderate/Sec. expat-2.2.5-11.el8_8.2.x86_64
RHSA-2024:2077 Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1997 Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.3.x86_64
CVE-2024-28834 (RHSA-2024:1997) Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.3.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.3.x86_64
RHSA-2024:1818 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:1818 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094 (RHSA-2024:1818) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:2621 Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2621 Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:1875 Moderate/Sec. less-530-2.el8_8.x86_64
CVE-2022-48624 (RHSA-2024:1875) Moderate/Sec. less-530-2.el8_8.x86_64
classification Moderate/Sec. less-530-2.el8_8.x86_64
RHSA-2024:1922 Moderate/Sec. libipa_hbac-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libipa_hbac-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libipa_hbac-2.8.2-4.el8_8.2.x86_64
RHSA-2024:2081 Moderate/Sec. libreswan-4.9-3.el8_8.1.x86_64
CVE-2024-2357 (RHSA-2024:2081) Moderate/Sec. libreswan-4.9-3.el8_8.1.x86_64
classification Moderate/Sec. libreswan-4.9-3.el8_8.1.x86_64
RHSA-2024:2077 Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_autofs-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_autofs-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_autofs-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_certmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_certmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_certmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_simpleifp-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_simpleifp-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_simpleifp-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. libsss_sudo-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. libsss_sudo-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. libsss_sudo-2.8.2-4.el8_8.2.x86_64
RHSA-2024:2621 Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:2077 Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1922 Moderate/Sec. python3-libipa_hbac-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-libipa_hbac-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-libipa_hbac-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. python3-libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-libsss_nss_idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:2621 Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2021-33631 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-3640 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2022-42895 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2023-6546 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
CVE-2024-25744 (RHSA-2024:2621) Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.55.1.el8_8.x86_64
RHSA-2024:1922 Moderate/Sec. python3-sss-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-sss-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-sss-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. python3-sss-murmur-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-sss-murmur-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. python3-sss-murmur-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. python3-sssdconfig-2.8.2-4.el8_8.2.noarch
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. python3-sssdconfig-2.8.2-4.el8_8.2.noarch
classification Moderate/Sec. python3-sssdconfig-2.8.2-4.el8_8.2.noarch
RHSA-2024:1802 Important/Sec. python3-unbound-1.16.2-5.el8_8.4.x86_64
CVE-2024-1488 (RHSA-2024:1802) Important/Sec. python3-unbound-1.16.2-5.el8_8.4.x86_64
classification Important/Sec. python3-unbound-1.16.2-5.el8_8.4.x86_64
RHSA-2024:2077 Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2577 Low/Sec. shadow-utils-2:4.6-17.el8_8.2.x86_64
CVE-2023-4641 (RHSA-2024:2577) Low/Sec. shadow-utils-2:4.6-17.el8_8.2.x86_64
classification Low/Sec. shadow-utils-2:4.6-17.el8_8.2.x86_64
RHSA-2024:2577 Low/Sec. shadow-utils-subid-2:4.6-17.el8_8.2.x86_64
CVE-2023-4641 (RHSA-2024:2577) Low/Sec. shadow-utils-subid-2:4.6-17.el8_8.2.x86_64
classification Low/Sec. shadow-utils-subid-2:4.6-17.el8_8.2.x86_64
RHSA-2024:2077 Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:2077 Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-4122 (RHSA-2024:2077) Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2022-32149 (RHSA-2024:2077) Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
CVE-2024-1753 (RHSA-2024:2077) Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
classification Important/Sec. slirp4netns-1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-ad-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-ad-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-ad-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-client-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-client-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-client-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-common-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-common-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-common-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-common-pac-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-common-pac-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-common-pac-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-dbus-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-dbus-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-dbus-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-idp-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-idp-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-idp-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-ipa-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-ipa-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-ipa-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-kcm-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-kcm-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-kcm-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-krb5-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-krb5-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-krb5-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-krb5-common-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-krb5-common-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-krb5-common-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-ldap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-ldap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-ldap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-nfs-idmap-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-nfs-idmap-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-nfs-idmap-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-proxy-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-proxy-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-proxy-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1922 Moderate/Sec. sssd-tools-2.8.2-4.el8_8.2.x86_64
CVE-2023-3758 (RHSA-2024:1922) Moderate/Sec. sssd-tools-2.8.2-4.el8_8.2.x86_64
classification Moderate/Sec. sssd-tools-2.8.2-4.el8_8.2.x86_64
RHSA-2024:1802 Important/Sec. unbound-libs-1.16.2-5.el8_8.4.x86_64
CVE-2024-1488 (RHSA-2024:1802) Important/Sec. unbound-libs-1.16.2-5.el8_8.4.x86_64
classification Important/Sec. unbound-libs-1.16.2-5.el8_8.4.x86_64
RHSA-2024:2580 Moderate/Sec. yajl-2.1.0-12.el8_8.x86_64
CVE-2023-33460 (RHSA-2024:2580) Moderate/Sec. yajl-2.1.0-12.el8_8.x86_64
classification Moderate/Sec. yajl-2.1.0-12.el8_8.x86_64
RHSA-2024:1406 Moderate/Sec. bind-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-export-libs-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-export-libs-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-export-libs-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-libs-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-libs-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-libs-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-libs-lite-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-libs-lite-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-libs-lite-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-license-32:9.11.36-8.el8_8.3.noarch
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-license-32:9.11.36-8.el8_8.3.noarch
classification Moderate/Sec. bind-license-32:9.11.36-8.el8_8.3.noarch
RHSA-2024:1406 Moderate/Sec. bind-pkcs11-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-pkcs11-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-pkcs11-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1406 Moderate/Sec. bind-utils-32:9.11.36-8.el8_8.3.x86_64
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. bind-utils-32:9.11.36-8.el8_8.3.x86_64
classification Moderate/Sec. bind-utils-32:9.11.36-8.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-client-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
classification Moderate/Sec. cups-filesystem-1:2.2.6-51.el8_8.3.noarch
RHSA-2024:1409 Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-ipptool-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1409 Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-32324 (RHSA-2024:1409) Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
CVE-2023-34241 (RHSA-2024:1409) Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
classification Moderate/Sec. cups-libs-1:2.2.6-51.el8_8.3.x86_64
RHSA-2024:1544 Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
CVE-2023-28450 (RHSA-2024:1544) Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
CVE-2023-50387 (RHSA-2024:1544) Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
CVE-2023-50868 (RHSA-2024:1544) Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
classification Important/Sec. dnsmasq-2.79-26.el8_8.4.x86_64
RHSA-2024:1415 Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2019-14560 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2023-3446 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2023-45230 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
CVE-2023-45234 (RHSA-2024:1415) Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
classification Important/Sec. edk2-ovmf-20220126gitbb1bba3d77-4.el8_8.3.noarch
RHSA-2024:1408 Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
CVE-2022-48337 (RHSA-2024:1408) Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
CVE-2022-48339 (RHSA-2024:1408) Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
classification Moderate/Sec. emacs-filesystem-1:26.1-10.el8_8.4.noarch
RHSA-2024:1412 Moderate/Sec. gmp-1:6.1.2-11.el8_8.1.x86_64
CVE-2021-43618 (RHSA-2024:1412) Moderate/Sec. gmp-1:6.1.2-11.el8_8.1.x86_64
classification Moderate/Sec. gmp-1:6.1.2-11.el8_8.1.x86_64
RHSA-2024:1412 Moderate/Sec. gmp-c++-1:6.1.2-11.el8_8.1.x86_64
CVE-2021-43618 (RHSA-2024:1412) Moderate/Sec. gmp-c++-1:6.1.2-11.el8_8.1.x86_64
classification Moderate/Sec. gmp-c++-1:6.1.2-11.el8_8.1.x86_64
RHSA-2024:1417 Moderate/Sec. libX11-1.6.8-6.el8_8.x86_64
CVE-2023-3138 (RHSA-2024:1417) Moderate/Sec. libX11-1.6.8-6.el8_8.x86_64
classification Moderate/Sec. libX11-1.6.8-6.el8_8.x86_64
RHSA-2024:1417 Moderate/Sec. libX11-common-1.6.8-6.el8_8.noarch
CVE-2023-3138 (RHSA-2024:1417) Moderate/Sec. libX11-common-1.6.8-6.el8_8.noarch
classification Moderate/Sec. libX11-common-1.6.8-6.el8_8.noarch
RHSA-2024:1417 Moderate/Sec. libX11-xcb-1.6.8-6.el8_8.x86_64
CVE-2023-3138 (RHSA-2024:1417) Moderate/Sec. libX11-xcb-1.6.8-6.el8_8.x86_64
classification Moderate/Sec. libX11-xcb-1.6.8-6.el8_8.x86_64
RHSA-2024:1411 Moderate/Sec. opencryptoki-3.19.0-3.el8_8.x86_64
CVE-2024-0914 (RHSA-2024:1411) Moderate/Sec. opencryptoki-3.19.0-3.el8_8.x86_64
classification Moderate/Sec. opencryptoki-3.19.0-3.el8_8.x86_64
RHSA-2024:1411 Moderate/Sec. opencryptoki-libs-3.19.0-3.el8_8.x86_64
CVE-2024-0914 (RHSA-2024:1411) Moderate/Sec. opencryptoki-libs-3.19.0-3.el8_8.x86_64
classification Moderate/Sec. opencryptoki-libs-3.19.0-3.el8_8.x86_64
RHSA-2024:1411 Moderate/Sec. opencryptoki-swtok-3.19.0-3.el8_8.x86_64
CVE-2024-0914 (RHSA-2024:1411) Moderate/Sec. opencryptoki-swtok-3.19.0-3.el8_8.x86_64
classification Moderate/Sec. opencryptoki-swtok-3.19.0-3.el8_8.x86_64
RHSA-2024:1406 Moderate/Sec. python3-bind-32:9.11.36-8.el8_8.3.noarch
CVE-2022-3094 (RHSA-2024:1406) Moderate/Sec. python3-bind-32:9.11.36-8.el8_8.3.noarch
classification Moderate/Sec. python3-bind-32:9.11.36-8.el8_8.3.noarch
8.8.24.03.SP16
The release date of the 8.8.24.03.SP16 security patch is 8 April 2024. The estimated run time is around 60 minutes.
| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |
Workaround:
- Run the following command from all non SPU nodes to check the /boot
parameter
value:
df -h /boot
Example:df -h /boot Filesystem Size Used Avail Use% Mounted on /dev/sda1 190M 177M 0 100% /boot
- If the /boot parameter shows use of 95% or greater value, run the following
commands on all non SPU nodes to free up storage in /boot.
- Run the following command to check which kernel versions are present in each non
SPU node:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
Example:[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Run the following command to find
the default kernel version set:
[root@e2n1 ~]# uname -r 4.18.0-477.55.1.el8_8.x86_64
- If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
- Check the current kernel installed, as in step 2.a.
[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Set the default kernel based on the numbers in the previous
steps:
grub2-set-default 1
- Check that the default kernel is correctly
set:
grubby --default-kernel
- Run the following commands to reboot the
node:
sudo reboot
Alternatively, viaipmitool
:- For Dell
system
ipmitool -I lanplus -H <node>bmc -U root -P calvin power on ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
- For Lenovo
system
ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
- For Dell
system
- After the reboot, run the following command to check the current
kernel:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
-
Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
grub2-set-default 1
Skip the step 3.
- Run the following command to check which kernel versions are present in each non
SPU node:
- Run the following command from all non SPU
nodes:
package-cleanup --oldkernels --count=1
Note: When the older kernel is removed, thegrub2.cfg
list (In Step 2.a) will get shuffled. Make sure that thegrubenv
(Step 2.b) points to the available current version.If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.
RHSA-2024:0576 Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
CVE-2021-3468 (RHSA-2024:0576) Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38469 (RHSA-2024:0576) Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38470 (RHSA-2024:0576) Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38471 (RHSA-2024:0576) Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38472 (RHSA-2024:0576) Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
CVE-2023-38473 (RHSA-2024:0576) Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
classification Moderate/Sec. avahi-0.7-20.el8_8.4.x86_64
RHSA-2024:0576 Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2021-3468 (RHSA-2024:0576) Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38469 (RHSA-2024:0576) Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38470 (RHSA-2024:0576) Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38471 (RHSA-2024:0576) Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38472 (RHSA-2024:0576) Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
CVE-2023-38473 (RHSA-2024:0576) Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
classification Moderate/Sec. avahi-glib-0.7-20.el8_8.4.x86_64
RHSA-2024:0576 Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2021-3468 (RHSA-2024:0576) Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38469 (RHSA-2024:0576) Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38470 (RHSA-2024:0576) Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38471 (RHSA-2024:0576) Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38472 (RHSA-2024:0576) Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
CVE-2023-38473 (RHSA-2024:0576) Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
classification Moderate/Sec. avahi-libs-0.7-20.el8_8.4.x86_64
RHSA-2023:5474 Important/Sec. bind-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-32:9.11.36-8.el8_8.2.x86_64
classification (RHSA-2023:5474) Important/Sec. bind-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-libs-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-libs-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-libs-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-license-32:9.11.36-8.el8_8.2.noarch
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-license-32:9.11.36-8.el8_8.2.noarch
classification Important/Sec. bind-license-32:9.11.36-8.el8_8.2.noarch
RHSA-2023:5474 Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:5474 Important/Sec. bind-utils-32:9.11.36-8.el8_8.2.x86_64
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. bind-utils-32:9.11.36-8.el8_8.2.x86_64
classification Important/Sec. bind-utils-32:9.11.36-8.el8_8.2.x86_64
RHSA-2023:6236 Moderate/Sec. binutils-2.30-119.el8_8.2.x86_64
CVE-2022-4285 (RHSA-2023:6236) Moderate/Sec. binutils-2.30-119.el8_8.2.x86_64
classification Moderate/Sec. binutils-2.30-119.el8_8.2.x86_64
RHSA-2023:7543 Moderate/Sec. c-ares-1.13.0-6.el8_8.3.x86_64
CVE-2022-4904 (RHSA-2023:7543) Moderate/Sec. c-ares-1.13.0-6.el8_8.3.x86_64
CVE-2023-31130 (RHSA-2023:7543) Moderate/Sec. c-ares-1.13.0-6.el8_8.3.x86_64
classification Moderate/Sec. c-ares-1.13.0-6.el8_8.3.x86_64
RHSA-2024:0578 Moderate/Sec. c-ares-1.13.0-6.el8_8.4.x86_64
CVE-2020-22217 (RHSA-2024:0578) Moderate/Sec. c-ares-1.13.0-6.el8_8.4.x86_64
classification Moderate/Sec. c-ares-1.13.0-6.el8_8.4.x86_64
RHSA-2023:5455 Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
classification Important/Sec. compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64
RHSA-2024:0759 Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. conmon-3:2.1.6-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
classification Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
ref_0 Important/Sec. container-selinux-2:2.205.0-2.module+el8.8.0+21265+93802b02.noarch
RHSA-2024:0759 Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. containers-common-2:1-64.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. criu-3.15-4.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. criu-libs-3.15-4.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. crun-1.8.4-2.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:4864 Important/Sec. cups-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4864 Important/Sec. cups-client-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-client-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-client-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4864 Important/Sec. cups-filesystem-1:2.2.6-51.el8_8.1.noarch
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-filesystem-1:2.2.6-51.el8_8.1.noarch
classification Important/Sec. cups-filesystem-1:2.2.6-51.el8_8.1.noarch
RHSA-2023:4864 Important/Sec. cups-ipptool-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-ipptool-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-ipptool-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4864 Important/Sec. cups-libs-1:2.2.6-51.el8_8.1.x86_64
CVE-2023-32360 (RHSA-2023:4864) Important/Sec. cups-libs-1:2.2.6-51.el8_8.1.x86_64
classification Important/Sec. cups-libs-1:2.2.6-51.el8_8.1.x86_64
RHSA-2023:4523 Moderate/Sec. curl-7.61.1-30.el8_8.3.x86_64
CVE-2023-27536 (RHSA-2023:4864) Moderate/Sec. curl-7.61.1-30.el8_8.3.x86_64
CVE-2023-28321 (RHSA-2023:4864) Moderate/Sec. curl-7.61.1-30.el8_8.3.x86_64
classification Moderate/Sec. curl-7.61.1-30.el8_8.3.x86_64
RHSA-2023:7540 Low/Sec. curl-7.61.1-30.el8_8.6.x86_64
CVE-2023-38546 (RHSA-2023:7540) Low/Sec. curl-7.61.1-30.el8_8.6.x86_64
classification Low/Sec. curl-7.61.1-30.el8_8.6.x86_64
RHSA-2024:0585 Moderate/Sec. curl-7.61.1-30.el8_8.9.x86_64
RHEL-5674 Moderate/Sec. curl-7.61.1-30.el8_8.9.x86_64
CVE-2023-28322 (RHSA-2024:0585) Moderate/Sec. curl-7.61.1-30.el8_8.9.x86_64
CVE-2023-46218 (RHSA-2024:0585) Moderate/Sec. curl-7.61.1-30.el8_8.9.x86_64
classification Moderate/Sec. curl-7.61.1-30.el8_8.9.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec. dbus-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-common-1:1.12.8-24.el8_8.1.noarch
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec. dbus-common-1:1.12.8-24.el8_8.1.noarch
classification Moderate/Sec. dbus-common-1:1.12.8-24.el8_8.1.noarch
RHSA-2023:4498 Moderate/Sec. dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec. dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-libs-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec. dbus-libs-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-libs-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-tools-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 (RHSA-2023:4498) Moderate/Sec. dbus-tools-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-tools-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:5252 Moderate/Sec. dmidecode-1:3.3-4.el8_8.1.x86_64
CVE-2023-30630 (RHSA-2023:5252) Moderate/Sec. dmidecode-1:3.3-4.el8_8.1.x86_64
classification Moderate/Sec. dmidecode-1:3.3-4.el8_8.1.x86_64
RHSA-2023:4706 Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
classification Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2023:7528 Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.2.x86_64
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.2.x86_64
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.2.x86_64
classification Moderate/Sec. fence-agents-all-4.2.1-112.el8_8.2.x86_64
RHSA-2023:7528 Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-amt-ws-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-apc-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-apc-snmp-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-bladecenter-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-brocade-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-cisco-mds-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-cisco-ucs-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-common-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-compute-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-drac5-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-eaton-snmp-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-emerson-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-eps-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-heuristics-ping-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-hpblade-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ibmblade-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ifmib-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ilo-mp-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ilo-ssh-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ilo2-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-intelmodular-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ipdu-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-ipmilan-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
classification Moderate/Sec. fence-agents-kdump-4.2.1-112.el8_8.2.x86_64
RHSA-2023:7528 Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-mpath-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
classification Moderate/Sec. fence-agents-redfish-4.2.1-112.el8_8.2.x86_64
RHSA-2023:7528 Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-rhevm-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-rsa-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-rsb-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-sbd-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-scsi-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-vmware-rest-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-vmware-soap-4.2.1-112.el8_8.2.noarch
RHSA-2023:7528 Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.2.noarch
CVE-2023-37920 (RHSA-2023:7528) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.2.noarch
CVE-2023-43804 (RHSA-2023:7528) Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.2.noarch
classification Moderate/Sec. fence-agents-wti-4.2.1-112.el8_8.2.noarch
RHSA-2023:5046 Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
CVE-2020-22219 (RHSA-2023:5046) Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
classification Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
RHSA-2023:5219 Important/Sec. frr-7.5.1-7.el8_8.2.x86_64
CVE-2023-38802 (RHSA-2023:5219) Important/Sec. frr-7.5.1-7.el8_8.2.x86_64
classification Important/Sec. frr-7.5.1-7.el8_8.2.x86_64
RHSA-2024:0574 Moderate/Sec. frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-38406 (RHSA-2024:0574) Moderate/Sec. frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-38407 (RHSA-2024:0574) Moderate/Sec. frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-47234 (RHSA-2024:0574) Moderate/Sec. frr-7.5.1-7.el8_8.5.x86_64
CVE-2023-47235 (RHSA-2024:0574) Moderate/Sec. frr-7.5.1-7.el8_8.5.x86_64
classification Moderate/Sec. frr-7.5.1-7.el8_8.5.x86_64
RHSA-2023:5219 Important/Sec. frr-selinux-7.5.1-7.el8_8.2.noarch
CVE-2023-38802 (RHSA-2023:5219) Important/Sec. frr-selinux-7.5.1-7.el8_8.2.noarch
classification Important/Sec. frr-selinux-7.5.1-7.el8_8.2.noarch
RHSA-2024:0574 Moderate/Sec. frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-38406 (RHSA-2024:0574) Moderate/Sec. frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-38407 (RHSA-2024:0574) Moderate/Sec. frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-47234 (RHSA-2024:0574) Moderate/Sec. frr-selinux-7.5.1-7.el8_8.5.noarch
CVE-2023-47235 (RHSA-2024:0574) Moderate/Sec. frr-selinux-7.5.1-7.el8_8.5.noarch
classification Moderate/Sec. frr-selinux-7.5.1-7.el8_8.5.noarch
RHSA-2024:0759 Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. fuse-overlayfs-1.11-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:5455 Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-all-langpacks-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-common-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-devel-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-gconv-extra-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-headers-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-langpack-en-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-locale-source-2.28-225.el8_8.6.x86_64
RHSA-2023:5455 Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
classification Important/Sec. glibc-minimal-langpack-2.28-225.el8_8.6.x86_64
RHSA-2024:0399 Moderate/Sec. gnutls-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981 (RHSA-2024:0399) Moderate/Sec. gnutls-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec. gnutls-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec. gnutls-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553 (RHSA-2024:0796) Moderate/Sec. gnutls-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec. gnutls-3.6.16-7.el8_8.2.x86_64
RHSA-2024:0399 Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981 (RHSA-2024:0399) Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553 (RHSA-2024:0796) Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-7.el8_8.2.x86_64
RHSA-2024:0399 Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981 (RHSA-2024:0399) Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553 (RHSA-2024:0796) Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-7.el8_8.2.x86_64
RHSA-2024:0399 Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.1.x86_64
CVE-2023-5981 (RHSA-2024:0399) Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.1.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.1.x86_64
RHSA-2024:0796 Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.2.x86_64
CVE-2024-0553 (RHSA-2024:0796) Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.2.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-7.el8_8.2.x86_64
RHSA-2023:5050 Moderate/Sec. httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec. httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec. httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:5050 Moderate/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7.noarch
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7.noarch
classification Moderate/Sec. httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7.noarch
RHSA-2023:5050 Moderate/Sec. httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec. httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec. httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:4570 Important/Sec. iperf3-3.5-7.el8_8.x86_64
CVE-2023-38403 (RHSA-2023:4570) Important/Sec. iperf3-3.5-7.el8_8.x86_64
classification Important/Sec. iperf3-3.5-7.el8_8.x86_64
RHSA-2023:5245 Moderate/Sec. iwl100-firmware-39.31.5.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl100-firmware-39.31.5.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl100-firmware-39.31.5.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl100-firmware-39.31.5.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl100-firmware-39.31.5.1-118.el8_8.1.noarch
classification Important/Sec. iwl100-firmware-39.31.5.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl1000-firmware-1:39.31.5.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl1000-firmware-1:39.31.5.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl1000-firmware-1:39.31.5.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl1000-firmware-1:39.31.5.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl1000-firmware-1:39.31.5.1-118.el8_8.1.noarch
classification Important/Sec. iwl1000-firmware-1:39.31.5.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl105-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl105-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl105-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl105-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl105-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl105-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl135-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl135-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl135-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl135-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl135-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl135-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl2000-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl2000-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl2000-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl2000-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl2000-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl2000-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl2030-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl2030-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl2030-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl2030-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl2030-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl2030-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl3160-firmware-1:25.30.13.0-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl3160-firmware-1:25.30.13.0-117.el8_8.1.noarch
classification Moderate/Sec. iwl3160-firmware-1:25.30.13.0-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl3160-firmware-1:25.30.13.0-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl3160-firmware-1:25.30.13.0-118.el8_8.1.noarch
classification Important/Sec. iwl3160-firmware-1:25.30.13.0-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl3945-firmware-15.32.2.9-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl3945-firmware-15.32.2.9-117.el8_8.1.noarch
classification Moderate/Sec. iwl3945-firmware-15.32.2.9-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl3945-firmware-15.32.2.9-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl3945-firmware-15.32.2.9-118.el8_8.1.noarch
classification Important/Sec. iwl3945-firmware-15.32.2.9-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl4965-firmware-228.61.2.24-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl4965-firmware-228.61.2.24-117.el8_8.1.noarch
classification Moderate/Sec. iwl4965-firmware-228.61.2.24-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl4965-firmware-228.61.2.24-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl4965-firmware-228.61.2.24-118.el8_8.1.noarch
classification Important/Sec. iwl4965-firmware-228.61.2.24-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl5000-firmware-8.83.5.1_1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl5000-firmware-8.83.5.1_1-117.el8_8.1.noarch
classification Moderate/Sec. iwl5000-firmware-8.83.5.1_1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl5000-firmware-8.83.5.1_1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl5000-firmware-8.83.5.1_1-118.el8_8.1.noarch
classification Important/Sec. iwl5000-firmware-8.83.5.1_1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl5150-firmware-8.24.2.2-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl5150-firmware-8.24.2.2-117.el8_8.1.noarch
classification Moderate/Sec. iwl5150-firmware-8.24.2.2-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl5150-firmware-8.24.2.2-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl5150-firmware-8.24.2.2-118.el8_8.1.noarch
classification Important/Sec. iwl5150-firmware-8.24.2.2-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl6000-firmware-9.221.4.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl6000-firmware-9.221.4.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl6000-firmware-9.221.4.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6000-firmware-9.221.4.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6000-firmware-9.221.4.1-118.el8_8.1.noarch
classification Important/Sec. iwl6000-firmware-9.221.4.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6000g2a-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6000g2a-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl6000g2a-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6000g2b-firmware-18.168.6.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6000g2b-firmware-18.168.6.1-118.el8_8.1.noarch
classification Important/Sec. iwl6000g2b-firmware-18.168.6.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl6050-firmware-41.28.5.1-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl6050-firmware-41.28.5.1-117.el8_8.1.noarch
classification Moderate/Sec. iwl6050-firmware-41.28.5.1-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl6050-firmware-41.28.5.1-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl6050-firmware-41.28.5.1-118.el8_8.1.noarch
classification Important/Sec. iwl6050-firmware-41.28.5.1-118.el8_8.1.noarch
RHSA-2023:5245 Moderate/Sec. iwl7260-firmware-1:25.30.13.0-117.el8_8.1.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. iwl7260-firmware-1:25.30.13.0-117.el8_8.1.noarch
classification Moderate/Sec. iwl7260-firmware-1:25.30.13.0-117.el8_8.1.noarch
RHSA-2024:0577 Important/Sec. iwl7260-firmware-1:25.30.13.0-118.el8_8.1.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. iwl7260-firmware-1:25.30.13.0-118.el8_8.1.noarch
classification Important/Sec. iwl7260-firmware-1:25.30.13.0-118.el8_8.1.noarch
RHSA-2023:4176 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045 (RHSA-2023:4176) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049 (RHSA-2023:4176) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433 (RHSA-2023:5731) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067 (RHSA-2023:5731) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081 (RHSA-2023:5731) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2023:4176 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045 (RHSA-2023:4176) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049 (RHSA-2023:4176) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433 (RHSA-2023:5731) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067 (RHSA-2023:5731) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081 (RHSA-2023:5731) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952 (RHSA-2024:0265) Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2023:4517 Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-core-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-core-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-core-4.18.0-477.43.1.el8_8.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 (RHSA-2022:6460) Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 (RHSA-2022:6460) Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 (RHSA-2022:6460) Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-28693 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
RHSA-2023:0101 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-2964 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-4139 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-425.10.1.el8_7.x86_64
RHSA-2023:0832 Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-2873 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-41222 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-43945 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-425.13.1.el8_7.x86_64
RHSA-2023:1566 Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4269 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4378 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0266 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0386 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-425.19.2.el8_7.x86_64
RHSA-2022:7683 Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
ref_0 Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
ref_1 Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2020-36516 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2020-36558 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2021-3640 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2021-30002 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-0168 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-0617 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-0854 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1016 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1048 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1055 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1158 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1184 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1263 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1280 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-1852 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2078 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2153 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2503 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2586 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2639 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-2938 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-3107 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-20368 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-20572 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-21499 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-23960 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-24448 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-26373 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-27950 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-28390 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-28893 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-29581 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
CVE-2022-36946 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-4.18.0-425.3.1.el8.x86_64
RHSA-2023:2951 Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
ref_0 Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-26341 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33655 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33656 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1462 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1679 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1789 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2196 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2663 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3028 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3239 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3522 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3524 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3564 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3566 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3567 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3619 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3623 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3625 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3628 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3707 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4129 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4662 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-20141 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-25265 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-30594 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-36879 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39188 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39189 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41218 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41674 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42703 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42720 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42721 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42722 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-43750 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-47929 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0394 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0461 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1095 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1195 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1582 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-2177 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-22998 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-23454 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-4.18.0-477.10.1.el8_8.x86_64
RHSA-2023:3349 Important/Sec. kernel-debuginfo-4.18.0-477.13.1.el8_8.x86_64
CVE-2023-32233 (RHSA-2023:3349) Important/Sec. kernel-debuginfo-4.18.0-477.13.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.13.1.el8_8.x86_64
RHSA-2023:3847 Moderate/Sec. kernel-debuginfo-4.18.0-477.15.1.el8_8.x86_64
CVE-2023-28466 (RHSA-2023:3847) Moderate/Sec. kernel-debuginfo-4.18.0-477.15.1.el8_8.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-477.15.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-debuginfo-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-477.43.1.el8_8.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 (RHSA-2022:6460) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 (RHSA-2022:6460) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 (RHSA-2022:6460) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-28693 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 (RHSA-2022:7110) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
RHSA-2023:0101 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-2964 (RHSA-2023:0101) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
CVE-2022-4139 (RHSA-2023:0101) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64
RHSA-2023:0832 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-2873 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-41222 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
CVE-2022-43945 (RHSA-2023:0832) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64
RHSA-2023:1566 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4269 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2022-4378 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0266 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
CVE-2023-0386 (RHSA-2023:1566) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64
RHSA-2022:7683 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
ref_0 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
ref_1 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2020-36516 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2020-36558 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2021-3640 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2021-30002 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-0168 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-0617 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-0854 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1016 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1048 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1055 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1158 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1184 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1263 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1280 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-1852 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2078 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2153 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2503 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2586 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2639 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-2938 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-3107 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-20368 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-20572 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-21499 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-23960 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-24448 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-26373 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-27950 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-28390 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-28893 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-29581 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
CVE-2022-36946 (RHSA-2022:7683) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64
RHSA-2023:2951 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
ref_0 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-26341 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33655 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2021-33656 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1462 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1679 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-1789 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2196 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-2663 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3028 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3239 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3522 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3524 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3564 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3566 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3567 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3619 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3623 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3625 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3628 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-3707 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4129 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-4662 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-20141 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-25265 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-30594 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-36879 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39188 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-39189 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41218 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-41674 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42703 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42720 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42721 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-42722 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-43750 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2022-47929 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0394 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-0461 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1095 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1195 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-1582 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-2177 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-22998 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
CVE-2023-23454 (RHSA-2023:2951) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.10.1.el8_8.x86_64
RHSA-2023:3349 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.13.1.el8_8.x86_64
CVE-2023-32233 (RHSA-2023:3349) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.13.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.13.1.el8_8.x86_64
RHSA-2023:3847 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64
CVE-2023-28466 (RHSA-2023:3847) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-devel-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-devel-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:057) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-devel-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-headers-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-headers-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-headers-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-modules-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-modules-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-modules-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:52440) Important/Sec. kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-modules-extra-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517 )Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 Important/Sec. kernel-tools-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-tools-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-tools-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4517 Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. kernel-tools-libs-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-477.43.1.el8_8.x86_64
RHSA-2023:4524 Moderate/Sec. libcap-2.48-5.el8_8.x86_64
CVE-2023-2602 (RHSA-2023:4524) Moderate/Sec. libcap-2.48-5.el8_8.x86_64
CVE-2023-2603 (RHSA-2023:4524) Moderate/Sec. libcap-2.48-5.el8_8.x86_64
classification Moderate/Sec. libcap-2.48-5.el8_8.x86_64
RHSA-2023:4523 (RHSA-2023:4523) Moderate/Sec. libcurl-7.61.1-30.el8_8.3.x86_64
CVE-2023-27536 (RHSA-2023:4523) Moderate/Sec. libcurl-7.61.1-30.el8_8.3.x86_64
CVE-2023-28321 Moderate/Sec. libcurl-7.61.1-30.el8_8.3.x86_64
classification Moderate/Sec. libcurl-7.61.1-30.el8_8.3.x86_64
RHSA-2023:7540 Low/Sec. libcurl-7.61.1-30.el8_8.6.x86_64
CVE-2023-38546 (RHSA-2023:7540) Low/Sec. libcurl-7.61.1-30.el8_8.6.x86_64
classification Low/Sec. libcurl-7.61.1-30.el8_8.6.x86_64
RHSA-2024:0585 Moderate/Sec. libcurl-7.61.1-30.el8_8.9.x86_64
RHEL-5674 Moderate/Sec. libcurl-7.61.1-30.el8_8.9.x86_64
CVE-2023-28322 (RHSA-2024:0585) Moderate/Sec. libcurl-7.61.1-30.el8_8.9.x86_64
CVE-2023-46218 (RHSA-2024:0585) Moderate/Sec. libcurl-7.61.1-30.el8_8.9.x86_64
classification Moderate/Sec. libcurl-7.61.1-30.el8_8.9.x86_64
RHSA-2024:0573 Moderate/Sec. libfastjson-0.99.9-1.el8_8.1.x86_64
CVE-2020-12762 (RHSA-2024:0573) Moderate/Sec. libfastjson-0.99.9-1.el8_8.1.x86_64
classification Moderate/Sec. libfastjson-0.99.9-1.el8_8.1.x86_64
RHSA-2024:0750 Moderate/Sec. libmaxminddb-1.2.0-10.el8_8.1.x86_64
CVE-2020-28241 (RHSA-2024:0750) Moderate/Sec. libmaxminddb-1.2.0-10.el8_8.1.x86_64
classification Moderate/Sec. libmaxminddb-1.2.0-10.el8_8.1.x86_64
RHSA-2023:4328 Moderate/Sec. libnetapi-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. libnetapi-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. libnetapi-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. libnetapi-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. libnetapi-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. libnetapi-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. libnetapi-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. libnetapi-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. libnetapi-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. libnetapi-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. libnetapi-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. libnetapi-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. libnetapi-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. libnetapi-4.17.5-5.el8_8.x86_64
RHSA-2023:5837 Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
CVE-2023-44487 (RHSA-2023:5837) Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
classification Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
ref_0 Important/Sec. libnghttp2-1.33.0-5.el8_8.x86_64
RHSA-2023:5455 Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
classification Important/Sec. libnsl-2.28-225.el8_8.6.x86_64
RHSA-2024:0759 Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. libslirp-4.4.0-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:4328 Moderate/Sec. libsmbclient-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. libsmbclient-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. libsmbclient-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. libsmbclient-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. libsmbclient-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. libsmbclient-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. libsmbclient-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. libsmbclient-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. libsmbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. libsmbclient-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. libsmbclient-4.17.5-5.el8_8.x86_64
RHSA-2024:0625 Moderate/Sec. libssh-0.9.6-13.el8_8.x86_64
CVE-2023-48795 (RHSA-2024:0625) Moderate/Sec. libssh-0.9.6-13.el8_8.x86_64
classification Moderate/Sec. libssh-0.9.6-13.el8_8.x86_64
RHSA-2024:0625 Moderate/Sec. libssh-config-0.9.6-13.el8_8.noarch
CVE-2023-48795 (RHSA-2024:0625) Moderate/Sec. libssh-config-0.9.6-13.el8_8.noarch
classification Moderate/Sec. libssh-config-0.9.6-13.el8_8.noarch
RHSA-2023:5353 Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0800 (RHSA-2023:5353) Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0801 (RHSA-2023:5353) Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0802 (RHSA-2023:5353) Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0803 (RHSA-2023:5353) Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
CVE-2023-0804 (RHSA-2023:5353) Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
classification Moderate/Sec. libtiff-4.0.9-29.el8_8.x86_64
RHSA-2023:5537 Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
CVE-2023-5217 (RHSA-2023:5537) Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
CVE-2023-44488 (RHSA-2023:5537) Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
classification Important/Sec. libvpx-1.7.0-10.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. libwbclient-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. libwbclient-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. libwbclient-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. libwbclient-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. libwbclient-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. libwbclient-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. libwbclient-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. libwbclient-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. libwbclient-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. libwbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. libwbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. libwbclient-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. libwbclient-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. libwbclient-4.17.5-5.el8_8.x86_64
RHSA-2023:5309 Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
classification Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-4863 (RHSA-2023:5309) Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-5129 (RHSA-2023:5309) Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
RHSA-2023:4529 Moderate/Sec. libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-28484 (RHSA-2023:4529) Moderate/Sec. libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-29469 (RHSA-2023:4529) Moderate/Sec. libxml2-2.9.7-16.el8_8.1.x86_64
classification Moderate/Sec. libxml2-2.9.7-16.el8_8.1.x86_64
RHSA-2023:7544 Moderate/Sec. libxml2-2.9.7-16.el8_8.2.x86_64
CVE-2023-39615 (RHSA-2023:7544) Moderate/Sec. libxml2-2.9.7-16.el8_8.2.x86_64
classification Moderate/Sec. libxml2-2.9.7-16.el8_8.2.x86_64
RHSA-2023:5245 Moderate/Sec. linux-firmware-20230404-117.git2e92a49f.el8_8.noarch
CVE-2023-20593 (RHSA-2023:5245) Moderate/Sec. linux-firmware-20230404-117.git2e92a49f.el8_8.noarch
classification Moderate/Sec. linux-firmware-20230404-117.git2e92a49f.el8_8.noarch
RHSA-2024:0577 Important/Sec. linux-firmware-20230404-118.git2e92a49f.el8_8.noarch
CVE-2022-46329 (RHSA-2024:0577) Important/Sec. linux-firmware-20230404-118.git2e92a49f.el8_8.noarch
classification Important/Sec. linux-firmware-20230404-118.git2e92a49f.el8_8.noarch
RHSA-2023:5259 Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084 (RHSA-2023:5259) Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091 (RHSA-2023:5259) Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791 (RHSA-2023:5259) Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015 (RHSA-2023:5259) Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5259 Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084 (RHSA-2023:5259) Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091 (RHSA-2023:5259) Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791 (RHSA-2023:5259) Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015 (RHSA-2023:5259) Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5050 Moderate/Sec. mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec. mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec. mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:5050 Moderate/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
CVE-2023-27522 (RHSA-2023:5050) Moderate/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
classification Moderate/Sec. mod_ssl-1:2.4.37-56.module+el8.8.0+19808+379766d6.7.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec. ncurses-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-base-6.1-9.20180224.el8_8.1.noarch
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec. ncurses-base-6.1-9.20180224.el8_8.1.noarch
classification Moderate/Sec. ncurses-base-6.1-9.20180224.el8_8.1.noarch
RHSA-2023:5249 Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 (RHSA-2023:5249) Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5455 Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. nscd-2.28-225.el8_8.6.x86_64
classification Important/Sec. nscd-2.28-225.el8_8.6.x86_64
RHSA-2024:0093 Moderate/Sec. nss-3.90.0-4.el8_8.x86_64
CVE-2023-5388 (RHSA-2024:0093) Moderate/Sec. nss-3.90.0-4.el8_8.x86_64
classification Moderate/Sec. nss-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec. nss-3.90.0-6.el8_8.x86_64
CVE-2023-6135 (RHSA-2024:0785) Moderate/Sec. nss-3.90.0-6.el8_8.x86_64
classification Moderate/Sec. nss-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec. nss-softokn-3.90.0-4.el8_8.x86_64
CVE-2023-5388 (RHSA-2024:0093) Moderate/Sec. nss-softokn-3.90.0-4.el8_8.x86_64
classification Moderate/Sec. nss-softokn-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec. nss-softokn-3.90.0-6.el8_8.x86_64
CVE-2023-6135 (RHSA-2024:0785) Moderate/Sec. nss-softokn-3.90.0-6.el8_8.x86_64
classification Moderate/Sec. nss-softokn-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec. nss-softokn-freebl-3.90.0-4.el8_8.x86_64
CVE-2023-5388 (RHSA-2024:0093) Moderate/Sec. nss-softokn-freebl-3.90.0-4.el8_8.x86_64
classification Moderate/Sec. nss-softokn-freebl-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec. nss-softokn-freebl-3.90.0-6.el8_8.x86_64
CVE-2023-6135 (RHSA-2024:0785) Moderate/Sec. nss-softokn-freebl-3.90.0-6.el8_8.x86_64
classification Moderate/Sec. nss-softokn-freebl-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec. nss-sysinit-3.90.0-4.el8_8.x86_64
CVE-2023-5388 (RHSA-2024:0093) Moderate/Sec. nss-sysinit-3.90.0-4.el8_8.x86_64
classification Moderate/Sec. nss-sysinit-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec. nss-sysinit-3.90.0-6.el8_8.x86_64
CVE-2023-6135 (RHSA-2024:0785) Moderate/Sec. nss-sysinit-3.90.0-6.el8_8.x86_64
classification Moderate/Sec. nss-sysinit-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec. nss-tools-3.90.0-4.el8_8.x86_64
CVE-2023-5388 (RHSA-2024:0093) Moderate/Sec. nss-tools-3.90.0-4.el8_8.x86_64
classification Moderate/Sec. nss-tools-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec. nss-tools-3.90.0-6.el8_8.x86_64
CVE-2023-6135 (RHSA-2024:0785) Moderate/Sec. nss-tools-3.90.0-6.el8_8.x86_64
classification Moderate/Sec. nss-tools-3.90.0-6.el8_8.x86_64
RHSA-2024:0093 Moderate/Sec. nss-util-3.90.0-4.el8_8.x86_64
CVE-2023-5388 (RHSA-2024:0093) Moderate/Sec. nss-util-3.90.0-4.el8_8.x86_64
classification Moderate/Sec. nss-util-3.90.0-4.el8_8.x86_64
RHSA-2024:0785 Moderate/Sec. nss-util-3.90.0-6.el8_8.x86_64
CVE-2023-6135 (RHSA-2024:0785) Moderate/Sec. nss-util-3.90.0-6.el8_8.x86_64
classification Moderate/Sec. nss-util-3.90.0-6.el8_8.x86_64
RHSA-2023:5455 Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4527 (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4806 (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4813 (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
CVE-2023-4911 (RHSA-2023:5455) Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
classification Important/Sec. nss_db-2.28-225.el8_8.6.x86_64
RHSA-2024:0572 Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-13224 (RHSA-2024:0572) Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-16163 (RHSA-2024:0572) Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-19012 (RHSA-2024:0572) Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-19203 (RHSA-2024:0572) Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
CVE-2019-19204 (RHSA-2024:0572) Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
classification Moderate/Sec. oniguruma-6.8.2-2.1.el8_8.x86_64
RHSA-2024:0594 Moderate/Sec. openssh-8.0p1-19.el8_8.2.x86_64
CVE-2023-48795 (RHSA-2024:0594) Moderate/Sec. openssh-8.0p1-19.el8_8.2.x86_64
CVE-2023-51385 (RHSA-2024:0594) Moderate/Sec. openssh-8.0p1-19.el8_8.2.x86_64
classification Moderate/Sec. openssh-8.0p1-19.el8_8.2.x86_64
RHSA-2023:4419 Important/Sec. openssh-8.0p1-19.el8_8.x86_64
CVE-2023-38408 (RHSA-2023:4419) Important/Sec. openssh-8.0p1-19.el8_8.x86_64
classification Important/Sec. openssh-8.0p1-19.el8_8.x86_64
RHSA-2024:0594 Moderate/Sec. openssh-clients-8.0p1-19.el8_8.2.x86_64
CVE-2023-48795 (RHSA-2024:0594) Moderate/Sec. openssh-clients-8.0p1-19.el8_8.2.x86_64
CVE-2023-51385 (RHSA-2024:0594) Moderate/Sec. openssh-clients-8.0p1-19.el8_8.2.x86_64
classification Moderate/Sec. openssh-clients-8.0p1-19.el8_8.2.x86_64
RHSA-2023:4419 Important/Sec. openssh-clients-8.0p1-19.el8_8.x86_64
CVE-2023-38408 (RHSA-2023:4419) Important/Sec. openssh-clients-8.0p1-19.el8_8.x86_64
classification Important/Sec. openssh-clients-8.0p1-19.el8_8.x86_64
RHSA-2024:0594 Moderate/Sec. openssh-server-8.0p1-19.el8_8.2.x86_64
CVE-2023-48795 (RHSA-2024:0594) Moderate/Sec. openssh-server-8.0p1-19.el8_8.2.x86_64
CVE-2023-51385 (RHSA-2024:0594) Moderate/Sec. openssh-server-8.0p1-19.el8_8.2.x86_64
classification Moderate/Sec. openssh-server-8.0p1-19.el8_8.2.x86_64
RHSA-2023:4419 Important/Sec. openssh-server-8.0p1-19.el8_8.x86_64
CVE-2023-38408 (RHSA-2023:4419) Important/Sec. openssh-server-8.0p1-19.el8_8.x86_64
classification Important/Sec. openssh-server-8.0p1-19.el8_8.x86_64
RHSA-2024:0154 Low/Sec. openssl-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3446 (RHSA-2024:0154) Low/Sec. openssl-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3817 (RHSA-2024:0154) Low/Sec. openssl-1:1.1.1k-12.el8_8.x86_64
CVE-2023-5678 (RHSA-2024:0154) Low/Sec. openssl-1:1.1.1k-12.el8_8.x86_64
classification Low/Sec. openssl-1:1.1.1k-12.el8_8.x86_64
RHSA-2024:0154 Low/Sec. openssl-devel-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3446 (RHSA-2024:0154) Low/Sec. openssl-devel-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3817 (RHSA-2024:0154) Low/Sec. openssl-devel-1:1.1.1k-12.el8_8.x86_64
CVE-2023-5678 (RHSA-2024:0154) Low/Sec. openssl-devel-1:1.1.1k-12.el8_8.x86_64
classification Low/Sec. openssl-devel-1:1.1.1k-12.el8_8.x86_64
RHSA-2024:0154 Low/Sec. openssl-libs-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3446 (RHSA-2024:0154) Low/Sec. openssl-libs-1:1.1.1k-12.el8_8.x86_64
CVE-2023-3817 (RHSA-2024:0154) Low/Sec. openssl-libs-1:1.1.1k-12.el8_8.x86_64
CVE-2023-5678 (RHSA-2024:0154) Low/Sec. openssl-libs-1:1.1.1k-12.el8_8.x86_64
classification Low/Sec. openssl-libs-1:1.1.1k-12.el8_8.x86_64
RHSA-2023:4517 Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. perf-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. perf-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
classification (RHSA-2024:0575) Important/Sec. perf-4.18.0-477.43.1.el8_8.x86_64
RHSA-2024:0579 Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
RHEL-21762 Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
CVE-2023-31486 (RHSA-2024:0579) Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
classification Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_8.2.noarch
RHSA-2023:7531 Moderate/Sec. pixman-0.38.4-3.el8_8.x86_64
CVE-2022-44638 (RHSA-2023:7531) Moderate/Sec. pixman-0.38.4-3.el8_8.x86_64
classification Moderate/Sec. pixman-0.38.4-3.el8_8.x86_64
RHSA-2023:5997 Important/Sec. platform-python-3.6.8-51.el8_8.2.x86_64
CVE-2023-40217 (RHSA-2023:5997) Important/Sec. platform-python-3.6.8-51.el8_8.2.x86_64
classification Important/Sec. platform-python-3.6.8-51.el8_8.2.x86_64
RHSA-2024:0586 Moderate/Sec. platform-python-3.6.8-51.el8_8.4.x86_64
CVE-2022-48560 (RHSA-2024:0586) Moderate/Sec. platform-python-3.6.8-51.el8_8.4.x86_64
CVE-2022-48564 (RHSA-2024:0586) Moderate/Sec. platform-python-3.6.8-51.el8_8.4.x86_64
CVE-2023-27043 (RHSA-2024:0586) Moderate/Sec. platform-python-3.6.8-51.el8_8.4.x86_64
classification Moderate/Sec. platform-python-3.6.8-51.el8_8.4.x86_64
RHSA-2023:5997 Important/Sec. platform-python-devel-3.6.8-51.el8_8.2.x86_64
CVE-2023-40217 (RHSA-2023:5997) Important/Sec. platform-python-devel-3.6.8-51.el8_8.2.x86_64
classification Important/Sec. platform-python-devel-3.6.8-51.el8_8.2.x86_64
RHSA-2024:0586 Moderate/Sec. platform-python-devel-3.6.8-51.el8_8.4.x86_64
CVE-2022-48560 (RHSA-2024:0586) Moderate/Sec. platform-python-devel-3.6.8-51.el8_8.4.x86_64
CVE-2022-48564 (RHSA-2024:0586) Moderate/Sec. platform-python-devel-3.6.8-51.el8_8.4.x86_64
CVE-2023-27043 (RHSA-2024:0586) Moderate/Sec. platform-python-devel-3.6.8-51.el8_8.4.x86_64
classification Moderate/Sec. platform-python-devel-3.6.8-51.el8_8.4.x86_64
RHSA-2024:0587 Moderate/Sec. platform-python-pip-9.0.3-22.1.el8_8.noarch
CVE-2007-4559 (RHSA-2024:0587) Moderate/Sec. platform-python-pip-9.0.3-22.1.el8_8.noarch
classification Moderate/Sec. platform-python-pip-9.0.3-22.1.el8_8.noarch
RHSA-2024:0759 Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. podman-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. podman-catatonit-3:4.4.1-17.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0862 Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
CVE-2023-44442 (RHSA-2024:0862) Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
CVE-2023-44444 (RHSA-2024:0862) Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
classification Important/Sec. pygtk2-2.24.0-25.module+el8.4.0+9382+ff08b506.x86_64
RHSA-2023:5994 Important/Sec. python2-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
CVE-2023-40217 (RHSA-2023:5994) Important/Sec. python2-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
classification Important/Sec. python2-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
RHSA-2023:5994 Important/Sec. python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
CVE-2023-40217 (RHSA-2023:5994) Important/Sec. python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
classification Important/Sec. python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
RHSA-2023:5994 Important/Sec. python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
CVE-2023-40217 (RHSA-2023:5994) Important/Sec. python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
classification Important/Sec. python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2.x86_64
RHSA-2023:5474 Important/Sec. python3-bind-32:9.11.36-8.el8_8.2.noarch
CVE-2023-3341 (RHSA-2023:5474) Important/Sec. python3-bind-32:9.11.36-8.el8_8.2.noarch
classification Important/Sec. python3-bind-32:9.11.36-8.el8_8.2.noarch
RHSA-2023:4706 Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
RHSA-2023:5997 Important/Sec. python3-libs-3.6.8-51.el8_8.2.x86_64
CVE-2023-40217 (RHSA-2023:5997) Important/Sec. python3-libs-3.6.8-51.el8_8.2.x86_64
classification Important/Sec. python3-libs-3.6.8-51.el8_8.2.x86_64
RHSA-2024:0586 Moderate/Sec. python3-libs-3.6.8-51.el8_8.4.x86_64
CVE-2022-48560 (RHSA-2024:0586) Moderate/Sec. python3-libs-3.6.8-51.el8_8.4.x86_64
CVE-2022-48564 (RHSA-2024:0586) Moderate/Sec. python3-libs-3.6.8-51.el8_8.4.x86_64
CVE-2023-27043 (RHSA-2024:0586) Moderate/Sec. python3-libs-3.6.8-51.el8_8.4.x86_64
classification Moderate/Sec. python3-libs-3.6.8-51.el8_8.4.x86_64
RHSA-2023:4529 Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-28484 (RHSA-2023:4529) Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.1.x86_64
CVE-2023-29469 (RHSA-2023:4529) Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.1.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.1.x86_64
RHSA-2023:7544 Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.2.x86_64
CVE-2023-39615 (RHSA-2023:7544) Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.2.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-16.el8_8.2.x86_64
RHSA-2023:4517 Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2022-42896 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1281 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-1829 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2124 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2194 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
CVE-2023-2235 (RHSA-2023:4517) Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.21.1.el8_8.x86_64
RHSA-2023:5244 Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-1637 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-2002 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3090 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3390 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-3776 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-4004 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-20593 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35001 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-35788 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
CVE-2023-44466 (RHSA-2023:5244) Important/Sec. python3-perf-4.18.0-477.27.1.el8_8.x86_64
RHSA-2023:7539 Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-40982 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45884 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45886 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2022-45919 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-1192 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-3609 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4128 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4206 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4207 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4208 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-4732 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-38409 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
CVE-2023-42753 (RHSA-2023:7539) Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
ref_0 Important/Sec. python3-perf-4.18.0-477.36.1.el8_8.x86_64
RHSA-2024:0575 Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-0458 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1073 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1075 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1079 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1838 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-1855 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2162 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-2163 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3141 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3567 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3611 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3772 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-3812 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4132 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4622 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-4623 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5178 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-5717 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-23455 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-26545 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-28328 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-31436 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-33203 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35823 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35824 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-35825 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-45871 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
CVE-2023-46813 (RHSA-2024:0575) Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
classification Important/Sec. python3-perf-4.18.0-477.43.1.el8_8.x86_64
RHSA-2024:0754 Important/Sec. python3-pillow-5.1.1-19.el8_8.x86_64
CVE-2023-50447 (RHSA-2024:0754) Important/Sec. python3-pillow-5.1.1-19.el8_8.x86_64
classification Important/Sec. python3-pillow-5.1.1-19.el8_8.x86_64
RHSA-2024:0587 Moderate/Sec. python3-pip-9.0.3-22.1.el8_8.noarch
CVE-2007-4559 (RHSA-2024:0587) Moderate/Sec. python3-pip-9.0.3-22.1.el8_8.noarch
classification Moderate/Sec. python3-pip-9.0.3-22.1.el8_8.noarch
RHSA-2024:0587 Moderate/Sec. python3-pip-wheel-9.0.3-22.1.el8_8.noarch
CVE-2007-4559 (RHSA-2024:0587) Moderate/Sec. python3-pip-wheel-9.0.3-22.1.el8_8.noarch
classification Moderate/Sec. python3-pip-wheel-9.0.3-22.1.el8_8.noarch
RHSA-2023:4520 Moderate/Sec. python3-requests-2.20.0-3.el8_8.noarch
CVE-2023-32681 (RHSA-2023:4520) Moderate/Sec. python3-requests-2.20.0-3.el8_8.noarch
classification Moderate/Sec. python3-requests-2.20.0-3.el8_8.noarch
RHSA-2024:0582 Moderate/Sec. python3-rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. python3-rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. python3-rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. python3-rpm-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. python3-rpm-4.14.3-28.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. python3-samba-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. python3-samba-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. python3-samba-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. python3-samba-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. python3-samba-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. python3-samba-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. python3-samba-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. python3-samba-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. python3-samba-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. python3-samba-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. python3-samba-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. python3-samba-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. python3-samba-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. python3-samba-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. python3-samba-dc-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. python3-samba-dc-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. python3-samba-dc-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. python3-samba-dc-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. python3-samba-dc-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. python3-samba-dc-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. python3-samba-dc-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. python3-samba-dc-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. python3-samba-dc-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. python3-samba-dc-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. python3-samba-dc-4.17.5-5.el8_8.x86_64
RHSA-2023:4706 Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
RHSA-2023:4706 Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
RHSA-2024:0982 Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:0982) Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:0982) Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
classification Important/Sec. python3-unbound-1.16.2-5.el8_8.1.x86_64
RHSA-2024:0588 Moderate/Sec. python3-urllib3-1.24.2-5.el8_8.1.noarch
CVE-2023-43804 (RHSA-2024:0588) Moderate/Sec. python3-urllib3-1.24.2-5.el8_8.1.noarch
CVE-2023-45803 (RHSA-2024:0588) Moderate/Sec. python3-urllib3-1.24.2-5.el8_8.1.noarch
classification Moderate/Sec. python3-urllib3-1.24.2-5.el8_8.1.noarch
RHSA-2023:5264 Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-img-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-common-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-core-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-docs-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:5264 Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
classification Important/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+19768+98f68f21.x86_64
RHSA-2024:0569 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
classification Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-33.module+el8.8.0+21116+c283fc6d.4.x86_64
RHSA-2023:4706 Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
classification Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
RHSA-2024:0582 Moderate/Sec. rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec. rpm-build-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-build-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-build-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-build-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-build-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec. rpm-build-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-build-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-build-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-build-libs-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-build-libs-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec. rpm-devel-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-devel-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-devel-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-devel-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-devel-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec. rpm-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-libs-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-libs-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-libs-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec. rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-plugin-selinux-4.14.3-28.el8_8.x86_64
RHSA-2024:0582 Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
CVE-2021-35937 (RHSA-2024:0582) Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
CVE-2021-35938 (RHSA-2024:0582) Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
CVE-2021-35939 (RHSA-2024:0582) Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
classification Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-28.el8_8.x86_64
RHSA-2024:0759 Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. runc-1:1.1.12-1.module+el8.8.0+21265+93802b02.x86_64
RHSA-2023:4328 Moderate/Sec. samba-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-client-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-client-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-client-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-client-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-client-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-client-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-client-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-client-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-client-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-client-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-client-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-client-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-client-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-client-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-client-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-client-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-client-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-client-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-client-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-client-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-client-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-client-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-client-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-client-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-client-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-common-4.17.5-3.el8_8.noarch
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-common-4.17.5-3.el8_8.noarch
classification Moderate/Sec. samba-common-4.17.5-3.el8_8.noarch
RHSA-2023:7464 Moderate/Sec. samba-common-4.17.5-4.el8_8.noarch
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-common-4.17.5-4.el8_8.noarch
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-common-4.17.5-4.el8_8.noarch
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-common-4.17.5-4.el8_8.noarch
classification Moderate/Sec. samba-common-4.17.5-4.el8_8.noarch
RHSA-2024:0580 Moderate/Sec. samba-common-4.17.5-5.el8_8.noarch
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-common-4.17.5-5.el8_8.noarch
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-common-4.17.5-5.el8_8.noarch
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-common-4.17.5-5.el8_8.noarch
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-common-4.17.5-5.el8_8.noarch
classification Moderate/Sec. samba-common-4.17.5-5.el8_8.noarch
RHSA-2023:4328 Moderate/Sec. samba-common-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-common-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-common-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-common-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-common-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-common-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-common-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-common-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-common-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-common-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-common-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-common-tools-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-common-tools-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-common-tools-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-common-tools-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-common-tools-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-common-tools-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-common-tools-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-common-tools-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-common-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-common-tools-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-common-tools-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-dc-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-dc-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-dc-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-dc-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-dc-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-dc-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-dc-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-dc-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-dc-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-dc-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-dc-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-dcerpc-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-dcerpc-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-dcerpc-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-dcerpc-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-dcerpc-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-dcerpc-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-dcerpc-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-dcerpc-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-dcerpc-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-dcerpc-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-dcerpc-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-ldb-ldap-modules-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-ldb-ldap-modules-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-ldb-ldap-modules-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464)Moderate/Sec. samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464)Moderate/Sec. samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464)Moderate/Sec. samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-ldb-ldap-modules-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-ldb-ldap-modules-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-libs-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-libs-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-libs-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-libs-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-libs-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-libs-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-libs-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-libs-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-libs-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-libs-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-libs-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-libs-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-tools-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-tools-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-tools-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-tools-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-tools-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-tools-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2023:7464) Moderate/Sec. samba-tools-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-tools-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-winbind-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-winbind-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-winbind-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-winbind-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-winbind-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-winbind-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-winbind-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-winbind-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-winbind-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-winbind-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-winbind-4.17.5-5.el8_8.x86_64
RHSA-2023:4328 Moderate/Sec. samba-winbind-modules-4.17.5-3.el8_8.x86_64
CVE-2023-3347 (RHSA-2023:4328) Moderate/Sec. samba-winbind-modules-4.17.5-3.el8_8.x86_64
classification Moderate/Sec. samba-winbind-modules-4.17.5-3.el8_8.x86_64
RHSA-2023:7464 Moderate/Sec. samba-winbind-modules-4.17.5-4.el8_8.x86_64
CVE-2023-3961 (RHSA-2023:7464) Moderate/Sec. samba-winbind-modules-4.17.5-4.el8_8.x86_64
CVE-2023-4091 (RHSA-2023:7464) Moderate/Sec. samba-winbind-modules-4.17.5-4.el8_8.x86_64
CVE-2023-42669 (RHSA-2023:7464) Moderate/Sec. samba-winbind-modules-4.17.5-4.el8_8.x86_64
classification Moderate/Sec. samba-winbind-modules-4.17.5-4.el8_8.x86_64
RHSA-2024:0580 Moderate/Sec. samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2022-2127 (RHSA-2024:0580) Moderate/Sec. samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34966 (RHSA-2024:0580) Moderate/Sec. samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34967 (RHSA-2024:0580) Moderate/Sec. samba-winbind-modules-4.17.5-5.el8_8.x86_64
CVE-2023-34968 (RHSA-2024:0580) Moderate/Sec. samba-winbind-modules-4.17.5-5.el8_8.x86_64
classification Moderate/Sec. samba-winbind-modules-4.17.5-5.el8_8.x86_64
RHSA-2023:5264 Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Important/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2024:0569 Moderate/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2021-3750 (RHSA-2024:0569) Moderate/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3019 (RHSA-2024:0569) Moderate/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Moderate/Sec. seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2023:5264 Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2022-40284 (RHSA-2023:5264) Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3354 (RHSA-2023:5264) Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Important/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2024:0569 Moderate/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2021-3750 (RHSA-2024:0569)Moderate/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
CVE-2023-3019 (RHSA-2024:0569)Moderate/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
classification Moderate/Sec. seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21.noarch
RHSA-2024:0759 Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. skopeo-2:1.11.2-0.2.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0759 Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
CVE-2024-21626 (RHSA-2024:0759) Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
classification Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
ref_0 Important/Sec. slirp4netns-1.2.0-2.module+el8.8.0+21265+93802b02.x86_64
RHSA-2024:0589 Moderate/Sec. sqlite-3.26.0-18.el8_8.1.x86_64
CVE-2023-7104 (RHSA-2024:0589) Moderate/Sec. sqlite-3.26.0-18.el8_8.1.x86_64
classification Moderate/Sec. sqlite-3.26.0-18.el8_8.1.x86_64
RHSA-2024:0589 Moderate/Sec. sqlite-libs-3.26.0-18.el8_8.1.x86_64
CVE-2023-7104 (RHSA-2024:0589) Moderate/Sec. sqlite-libs-3.26.0-18.el8_8.1.x86_64
classification Moderate/Sec. sqlite-libs-3.26.0-18.el8_8.1.x86_64
RHSA-2023:4706 Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
classification Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2023:4706 Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
classification Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
RHSA-2023:4706 Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
CVE-2023-3899 (RHSA-2023:4706) Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
classification Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
RHSA-2024:0811 Moderate/Sec. sudo-1.9.5p2-1.el8_8.x86_64
CVE-2023-28486 (RHSA-2024:0811) Moderate/Sec. sudo-1.9.5p2-1.el8_8.x86_64
CVE-2023-28487 (RHSA-2024:0811) Moderate/Sec. sudo-1.9.5p2-1.el8_8.x86_64
CVE-2023-42465 (RHSA-2024:0811) Moderate/Sec. sudo-1.9.5p2-1.el8_8.x86_64
classification Moderate/Sec. sudo-1.9.5p2-1.el8_8.x86_64
RHSA-2024:0571 Moderate/Sec. tcpdump-14:4.9.3-3.el8_8.1.x86_64
CVE-2021-41043 (RHSA-2024:0571) Moderate/Sec. tcpdump-14:4.9.3-3.el8_8.1.x86_64
classification Moderate/Sec. tcpdump-14:4.9.3-3.el8_8.1.x86_64
RHSA-2024:0982 Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
CVE-2023-50387 (RHSA-2024:0982) Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
CVE-2023-50868 (RHSA-2024:0982) Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
classification Important/Sec. unbound-libs-1.16.2-5.el8_8.1.x86_64
8.6.24.02.SP15
The release date of the 8.6.24.02.SP15 security patch is 28 February 2024. The estimated run time is around 80 minutes.
The 8.6.24.02.SP15 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |
Workaround:
- Run the following command from all non SPU nodes to check the /boot
parameter
value:
df -h /boot
Example:df -h /boot Filesystem Size Used Avail Use% Mounted on /dev/sda1 190M 177M 0 100% /boot
- If the /boot parameter shows use of 95% or greater value, run the following
commands on all non SPU nodes to free up storage in /boot.
- Run the following command to check which kernel versions are present in each non
SPU node:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
Example:[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Run the following command to find
the default kernel version set:
[root@e2n1 ~]# uname -r 4.18.0-477.55.1.el8_8.x86_64
- If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
- Check the current kernel installed, as in step 2.a.
[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Set the default kernel based on the numbers in the previous
steps:
grub2-set-default 1
- Check that the default kernel is correctly
set:
grubby --default-kernel
- Run the following commands to reboot the
node:
sudo reboot
Alternatively, viaipmitool
:- For Dell
system
ipmitool -I lanplus -H <node>bmc -U root -P calvin power on ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
- For Lenovo
system
ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
- For Dell
system
- After the reboot, run the following command to check the current
kernel:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
-
Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
grub2-set-default 1
Skip the step 3.
- Run the following command to check which kernel versions are present in each non
SPU node:
- Run the following command from all non SPU
nodes:
package-cleanup --oldkernels --count=1
Note: When the older kernel is removed, thegrub2.cfg
list (In Step 2.a) will get shuffled. Make sure that thegrubenv
(Step 2.b) points to the available current version.If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.
RHSA-2024:0418 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
CVE-2021-3468 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38469 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38470 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38471 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38472 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
CVE-2023-38473 Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
classification Moderate/Sec. avahi-0.7-20.el8_6.3.x86_64
RHSA-2024:0418 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2021-3468 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38469 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38470 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38471 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38472 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
CVE-2023-38473 Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
classification Moderate/Sec. avahi-glib-0.7-20.el8_6.3.x86_64
RHSA-2024:0418 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2021-3468 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38469 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38470 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38471 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38472 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
CVE-2023-38473 Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
classification Moderate/Sec. avahi-libs-0.7-20.el8_6.3.x86_64
RHSA-2024:0419 Moderate/Sec. c-ares-1.13.0-6.el8_6.3.x86_64
CVE-2020-22217 Moderate/Sec. c-ares-1.13.0-6.el8_6.3.x86_64
classification Moderate/Sec. c-ares-1.13.0-6.el8_6.3.x86_64
RHSA-2024:0428 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
CVE-2022-35252 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
CVE-2022-43552 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27535 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27536 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-28322 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
CVE-2023-46218 Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
classification Moderate/Sec. curl-7.61.1-22.el8_6.12.x86_64
RHSA-2024:0421 Moderate/Sec. expat-2.2.5-8.el8_6.4.x86_64
CVE-2022-43680 Moderate/Sec. expat-2.2.5-8.el8_6.4.x86_64
classification Moderate/Sec. expat-2.2.5-8.el8_6.4.x86_64
RHSA-2024:0420 Moderate/Sec. freetype-2.9.1-5.el8_6.3.x86_64
CVE-2022-27404 Moderate/Sec. freetype-2.9.1-5.el8_6.3.x86_64
CVE-2022-27405 Moderate/Sec. freetype-2.9.1-5.el8_6.3.x86_64
CVE-2022-27406 Moderate/Sec. freetype-2.9.1-5.el8_6.3.x86_64
classification Moderate/Sec. freetype-2.9.1-5.el8_6.3.x86_64
RHSA-2024:0319 Moderate/Sec. gnutls-3.6.16-5.el8_6.2.x86_64
CVE-2023-5981 Moderate/Sec. gnutls-3.6.16-5.el8_6.2.x86_64
classification Moderate/Sec. gnutls-3.6.16-5.el8_6.2.x86_64
RHSA-2024:0412 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-core-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-debuginfo-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-devel-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-headers-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-modules-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-modules-extra-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-tools-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0412 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. kernel-tools-libs-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec. krb5-devel-1.18.2-16.el8_6.x86_64
RHEL-17108 Moderate/Sec. krb5-devel-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec. krb5-devel-1.18.2-16.el8_6.x86_64
CVE-2023-5455 Moderate/Sec. krb5-devel-1.18.2-16.el8_6.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec. krb5-libs-1.18.2-16.el8_6.x86_64
RHEL-17108 Moderate/Sec. krb5-libs-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec. krb5-libs-1.18.2-16.el8_6.x86_64
CVE-2023-5455 Moderate/Sec. krb5-libs-1.18.2-16.el8_6.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec. krb5-pkinit-1.18.2-16.el8_6.x86_64
RHEL-17108 Moderate/Sec. krb5-pkinit-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec. krb5-pkinit-1.18.2-16.el8_6.x86_64
CVE-2023-5455 Moderate/Sec. krb5-pkinit-1.18.2-16.el8_6.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec. krb5-server-1.18.2-16.el8_6.x86_64
RHEL-17108 Moderate/Sec. krb5-server-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec. krb5-server-1.18.2-16.el8_6.x86_64
CVE-2023-5455 Moderate/Sec. krb5-server-1.18.2-16.el8_6.x86_64
classification Moderate/Sec. krb5-server-1.18.2-16.el8_6.x86_64
RHSA-2024:0252 Moderate/Sec. krb5-workstation-1.18.2-16.el8_6.x86_64
RHEL-17108 Moderate/Sec. krb5-workstation-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec. krb5-workstation-1.18.2-16.el8_6.x86_64
CVE-2023-5455 Moderate/Sec. krb5-workstation-1.18.2-16.el8_6.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-16.el8_6.x86_64
RHSA-2024:0146 Low/Sec. libarchive-3.3.3-4.el8_6.x86_64
CVE-2022-36227 Low/Sec. libarchive-3.3.3-4.el8_6.x86_64
classification Low/Sec. libarchive-3.3.3-4.el8_6.x86_64
RHSA-2024:0428 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2022-35252 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2022-43552 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27535 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-27536 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-28322 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
CVE-2023-46218 Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
classification Moderate/Sec. libcurl-7.61.1-22.el8_6.12.x86_64
RHSA-2024:0252 Moderate/Sec. libkadm5-1.18.2-16.el8_6.x86_64
RHEL-17108 Moderate/Sec. libkadm5-1.18.2-16.el8_6.x86_64
CVE-2020-17049 Moderate/Sec. libkadm5-1.18.2-16.el8_6.x86_64
CVE-2023-5455 Moderate/Sec. libkadm5-1.18.2-16.el8_6.x86_64
classification Moderate/Sec. libkadm5-1.18.2-16.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. libsmbclient-4.15.5-15.el8_6.x86_64
RHSA-2024:0538 Moderate/Sec. libssh-0.9.6-4.el8_6.x86_64
CVE-2023-1667 Moderate/Sec. libssh-0.9.6-4.el8_6.x86_64
CVE-2023-2283 Moderate/Sec. libssh-0.9.6-4.el8_6.x86_64
CVE-2023-48795 Moderate/Sec. libssh-0.9.6-4.el8_6.x86_64
classification Moderate/Sec. libssh-0.9.6-4.el8_6.x86_64
RHSA-2024:0538 Moderate/Sec. libssh-config-0.9.6-4.el8_6.noarch
CVE-2023-1667 Moderate/Sec. libssh-config-0.9.6-4.el8_6.noarch
CVE-2023-2283 Moderate/Sec. libssh-config-0.9.6-4.el8_6.noarch
CVE-2023-48795 Moderate/Sec. libssh-config-0.9.6-4.el8_6.noarch
classification Moderate/Sec. libssh-config-0.9.6-4.el8_6.noarch
RHSA-2024:0427 Moderate/Sec. libtasn1-4.13-3.el8_6.1.x86_64
CVE-2021-46848 Moderate/Sec. libtasn1-4.13-3.el8_6.1.x86_64
classification Moderate/Sec. libtasn1-4.13-3.el8_6.1.x86_64
RHSA-2024:0423 Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. libwbclient-4.15.5-15.el8_6.x86_64
RHSA-2024:0413 Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40303 Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40304 Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-28484 Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-29469 Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-39615 Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
classification Moderate/Sec. libxml2-2.9.7-13.el8_6.4.x86_64
RHSA-2024:0416 Moderate/Sec. ncurses-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec. ncurses-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0416 Moderate/Sec. ncurses-base-6.1-9.20180224.el8_6.1.noarch
CVE-2023-29491 Moderate/Sec. ncurses-base-6.1-9.20180224.el8_6.1.noarch
classification Moderate/Sec. ncurses-base-6.1-9.20180224.el8_6.1.noarch
RHSA-2024:0416 Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0416 Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0416 Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_6.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_6.1.x86_64
classification Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_6.1.x86_64
RHSA-2024:0429 Moderate/Sec. openssh-8.0p1-15.el8_6.3.x86_64
CVE-2023-48795 Moderate/Sec. openssh-8.0p1-15.el8_6.3.x86_64
CVE-2023-51385 Moderate/Sec. openssh-8.0p1-15.el8_6.3.x86_64
classification Moderate/Sec. openssh-8.0p1-15.el8_6.3.x86_64
RHSA-2024:0429 Moderate/Sec. openssh-clients-8.0p1-15.el8_6.3.x86_64
CVE-2023-48795 Moderate/Sec. openssh-clients-8.0p1-15.el8_6.3.x86_64
CVE-2023-51385 Moderate/Sec. openssh-clients-8.0p1-15.el8_6.3.x86_64
classification Moderate/Sec. openssh-clients-8.0p1-15.el8_6.3.x86_64
RHSA-2024:0429 Moderate/Sec. openssh-server-8.0p1-15.el8_6.3.x86_64
CVE-2023-48795 Moderate/Sec. openssh-server-8.0p1-15.el8_6.3.x86_64
CVE-2023-51385 Moderate/Sec. openssh-server-8.0p1-15.el8_6.3.x86_64
classification Moderate/Sec. openssh-server-8.0p1-15.el8_6.3.x86_64
RHSA-2024:0208 Low/Sec. openssl-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3446 Low/Sec. openssl-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3817 Low/Sec. openssl-1:1.1.1k-12.el8_6.x86_64
CVE-2023-5678 Low/Sec. openssl-1:1.1.1k-12.el8_6.x86_64
classification Low/Sec. openssl-1:1.1.1k-12.el8_6.x86_64
RHSA-2024:0208 Low/Sec. openssl-devel-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3446 Low/Sec. openssl-devel-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3817 Low/Sec. openssl-devel-1:1.1.1k-12.el8_6.x86_64
CVE-2023-5678 Low/Sec. openssl-devel-1:1.1.1k-12.el8_6.x86_64
classification Low/Sec. openssl-devel-1:1.1.1k-12.el8_6.x86_64
RHSA-2024:0208 Low/Sec. openssl-libs-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3446 Low/Sec. openssl-libs-1:1.1.1k-12.el8_6.x86_64
CVE-2023-3817 Low/Sec. openssl-libs-1:1.1.1k-12.el8_6.x86_64
CVE-2023-5678 Low/Sec. openssl-libs-1:1.1.1k-12.el8_6.x86_64
classification Low/Sec. openssl-libs-1:1.1.1k-12.el8_6.x86_64
RHSA-2024:0412 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. perf-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0422 Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_6.1.noarch
CVE-2023-31486 Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_6.1.noarch
classification Moderate/Sec. perl-HTTP-Tiny-0.074-1.el8_6.1.noarch
RHSA-2024:0430 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2007-4559 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2020-10735 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2022-45061 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2022-48560 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2022-48564 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
CVE-2023-27043 Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
classification Moderate/Sec. platform-python-3.6.8-47.el8_6.4.x86_64
RHSA-2024:0374 Moderate/Sec. platform-python-pip-9.0.3-22.1.el8_6.noarch
CVE-2007-4559 Moderate/Sec. platform-python-pip-9.0.3-22.1.el8_6.noarch
classification Moderate/Sec. platform-python-pip-9.0.3-22.1.el8_6.noarch
RHSA-2024:0430 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2007-4559 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2020-10735 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2022-45061 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2022-48560 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2022-48564 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
CVE-2023-27043 Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
classification Moderate/Sec. python3-libs-3.6.8-47.el8_6.4.x86_64
RHSA-2024:0413 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40303 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2022-40304 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-28484 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-29469 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
CVE-2023-39615 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.4.x86_64
RHSA-2024:0412 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-0854 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1016 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-1679 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3028 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3522 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3567 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-3628 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-4129 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-20141 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-30594 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-40982 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41218 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-41858 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-43750 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2022-47929 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-0394 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1073 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1079 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1192 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1195 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1382 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1838 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1855 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-1998 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2162 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2163 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2194 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-2513 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3161 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3268 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3567 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3611 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3772 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-3812 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4459 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4622 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4623 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-4732 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-5178 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-23454 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-26545 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-31436 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-33203 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35823 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-35824 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-38409 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-42753 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2023-45871 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
CVE-2024-0562 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
ref_0 Important/Sec. python3-perf-4.18.0-372.87.1.el8_6.x86_64
RHSA-2024:0374 Moderate/Sec. python3-pip-wheel-9.0.3-22.1.el8_6.noarch
CVE-2007-4559 Moderate/Sec. python3-pip-wheel-9.0.3-22.1.el8_6.noarch
classification Moderate/Sec. python3-pip-wheel-9.0.3-22.1.el8_6.noarch
RHSA-2024:0299 Moderate/Sec. python3-requests-2.20.0-3.el8_6.noarch
CVE-2023-32681 Moderate/Sec. python3-requests-2.20.0-3.el8_6.noarch
classification Moderate/Sec. python3-requests-2.20.0-3.el8_6.noarch
RHSA-2024:0424 Moderate/Sec. python3-rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. python3-rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. python3-rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. python3-rpm-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. python3-rpm-4.14.3-26.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. python3-samba-4.15.5-15.el8_6.x86_64
RHSA-2024:0300 Moderate/Sec. python3-urllib3-1.24.2-5.el8_6.1.noarch
CVE-2023-43804 Moderate/Sec. python3-urllib3-1.24.2-5.el8_6.1.noarch
CVE-2023-45803 Moderate/Sec. python3-urllib3-1.24.2-5.el8_6.1.noarch
classification Moderate/Sec. python3-urllib3-1.24.2-5.el8_6.1.noarch
RHSA-2024:0424 Moderate/Sec. rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. rpm-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. rpm-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. rpm-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec. rpm-build-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. rpm-build-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. rpm-build-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. rpm-build-libs-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. rpm-build-libs-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec. rpm-devel-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. rpm-devel-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. rpm-devel-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. rpm-devel-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. rpm-devel-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec. rpm-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. rpm-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. rpm-libs-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. rpm-libs-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. rpm-libs-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec. rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. rpm-plugin-selinux-4.14.3-26.el8_6.x86_64
RHSA-2024:0424 Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
CVE-2021-35937 Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
CVE-2021-35938 Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
CVE-2021-35939 Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
classification Moderate/Sec. rpm-plugin-systemd-inhibit-4.14.3-26.el8_6.x86_64
RHSA-2024:0254 Moderate/Sec. rsync-3.1.3-14.el8_6.5.x86_64
CVE-2022-37434 Moderate/Sec. rsync-3.1.3-14.el8_6.5.x86_64
classification Moderate/Sec. rsync-3.1.3-14.el8_6.5.x86_64
RHSA-2024:0254 Moderate/Sec. rsync-daemon-3.1.3-14.el8_6.5.noarch
CVE-2022-37434 Moderate/Sec. rsync-daemon-3.1.3-14.el8_6.5.noarch
classification Moderate/Sec. rsync-daemon-3.1.3-14.el8_6.5.noarch
RHSA-2024:0423 Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-client-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-client-libs-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
CVE-2022-1615 Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
CVE-2022-2127 Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
CVE-2023-34966 Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
CVE-2023-34967 Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
CVE-2023-34968 Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
classification Moderate/Sec. samba-common-4.15.5-15.el8_6.noarch
RHSA-2024:0423 Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-common-libs-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-common-tools-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-libs-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-winbind-4.15.5-15.el8_6.x86_64
RHSA-2024:0423 Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2022-1615 Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2022-2127 Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2023-34966 Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2023-34967 Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
CVE-2023-34968 Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
classification Moderate/Sec. samba-winbind-modules-4.15.5-15.el8_6.x86_64
RHSA-2024:0417 Low/Sec. shadow-utils-2:4.6-17.el8_6.x86_64
CVE-2023-4641 Low/Sec. shadow-utils-2:4.6-17.el8_6.x86_64
classification Low/Sec. shadow-utils-2:4.6-17.el8_6.x86_64
RHSA-2024:0417 Low/Sec. shadow-utils-subid-2:4.6-17.el8_6.x86_64
CVE-2023-4641 Low/Sec. shadow-utils-subid-2:4.6-17.el8_6.x86_64
classification Low/Sec. shadow-utils-subid-2:4.6-17.el8_6.x86_64
RHSA-2024:0425 Moderate/Sec. sqlite-3.26.0-16.el8_6.1.x86_64
CVE-2020-24736 Moderate/Sec. sqlite-3.26.0-16.el8_6.1.x86_64
CVE-2022-35737 Moderate/Sec. sqlite-3.26.0-16.el8_6.1.x86_64
classification Moderate/Sec. sqlite-3.26.0-16.el8_6.1.x86_64
RHSA-2024:0425 Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.1.x86_64
CVE-2020-24736 Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.1.x86_64
CVE-2022-35737 Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.1.x86_64
classification Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.1.x86_64
8.6.23.12.SP14
The release date of the 8.6.23.12.SP14 security patch is 29 January 2024. The estimated run time is around 80 minutes.
The 8.6.23.12.SP14 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
CVE-2023-2603
and
CVE-2022-40897
. To resolve them, contact IBM support.- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |
Workaround:
- Run the following command from all non SPU nodes to check the /boot
parameter
value:
df -h /boot
Example:df -h /boot Filesystem Size Used Avail Use% Mounted on /dev/sda1 190M 177M 0 100% /boot
- If the /boot parameter shows use of 95% or greater value, run the following
commands on all non SPU nodes to free up storage in /boot.
- Run the following command to check which kernel versions are present in each non
SPU node:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
Example:[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Run the following command to find
the default kernel version set:
[root@e2n1 ~]# uname -r 4.18.0-477.55.1.el8_8.x86_64
- If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
- Check the current kernel installed, as in step 2.a.
[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Set the default kernel based on the numbers in the previous
steps:
grub2-set-default 1
- Check that the default kernel is correctly
set:
grubby --default-kernel
- Run the following commands to reboot the
node:
sudo reboot
Alternatively, viaipmitool
:- For Dell
system
ipmitool -I lanplus -H <node>bmc -U root -P calvin power on ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
- For Lenovo
system
ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
- For Dell
system
- After the reboot, run the following command to check the current
kernel:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
-
Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
grub2-set-default 1
Skip the step 3.
- Run the following command to check which kernel versions are present in each non
SPU node:
- Run the following command from all non SPU
nodes:
package-cleanup --oldkernels --count=1
Note: When the older kernel is removed, thegrub2.cfg
list (In Step 2.a) will get shuffled. Make sure that thegrubenv
(Step 2.b) points to the available current version.If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.
RHSA-2023:7394 Moderate/Sec. binutils-2.30-113.el8_6.2.x86_64
CVE-2022-4285 Moderate/Sec. binutils-2.30-113.el8_6.2.x86_64
classification Moderate/Sec. binutils-2.30-113.el8_6.2.x86_64
RHSA-2023:7392 Moderate/Sec. c-ares-1.13.0-6.el8_6.2.x86_64
CVE-2023-31130 Moderate/Sec. c-ares-1.13.0-6.el8_6.2.x86_64
classification Moderate/Sec. c-ares-1.13.0-6.el8_6.2.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-all-langpacks-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-all-langpacks-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-all-langpacks-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-common-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-common-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-common-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-common-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-devel-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-devel-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-devel-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-devel-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-gconv-extra-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-gconv-extra-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-gconv-extra-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-headers-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-headers-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-headers-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-headers-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-langpack-en-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-langpack-en-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-langpack-en-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-locale-source-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-locale-source-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-locale-source-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-189.8.el8_6.x86_64
RHSA-2023:7401 Moderate/Sec. iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl100-firmware-39.31.5.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl1000-firmware-1:39.31.5.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl105-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl135-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl2000-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl2030-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
classification Moderate/Sec. iwl3160-firmware-1:25.30.13.0-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
classification Moderate/Sec. iwl3945-firmware-15.32.2.9-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
classification Moderate/Sec. iwl4965-firmware-228.61.2.24-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
classification Moderate/Sec. iwl5000-firmware-8.83.5.1_1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
classification Moderate/Sec. iwl5150-firmware-8.24.2.2-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl6000-firmware-9.221.4.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl6000g2a-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl6000g2b-firmware-18.168.6.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
classification Moderate/Sec. iwl6050-firmware-41.28.5.1-112.el8_6.1.noarch
RHSA-2023:7401 Moderate/Sec. iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20569 Moderate/Sec. iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
CVE-2023-20593 Moderate/Sec. iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
classification Moderate/Sec. iwl7260-firmware-1:25.30.13.0-112.el8_6.1.noarch
RHSA-2023:7398 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7398 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7400 Moderate/Sec. libcap-2.48-4.el8_6.x86_64
CVE-2023-2602 Moderate/Sec. libcap-2.48-4.el8_6.x86_64
CVE-2023-2603 Moderate/Sec. libcap-2.48-4.el8_6.x86_64
classification Moderate/Sec. libcap-2.48-4.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. libnsl-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. libnsl-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. libnsl-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. libnsl-2.28-189.8.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. libsmbclient-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. libsmbclient-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. libsmbclient-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. libsmbclient-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. libsmbclient-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. libwbclient-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. libwbclient-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. libwbclient-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. libwbclient-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. libwbclient-4.15.5-13.el8_6.x86_64
RHSA-2023:7401 Moderate/Sec. linux-firmware-20220210-112.git6342082c.el8_6.noarch
CVE-2023-20569 Moderate/Sec. linux-firmware-20220210-112.git6342082c.el8_6.noarch
CVE-2023-20593 Moderate/Sec. linux-firmware-20220210-112.git6342082c.el8_6.noarch
classification Moderate/Sec. linux-firmware-20220210-112.git6342082c.el8_6.noarch
RHSA-2023:7409 Moderate/Sec. nscd-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. nscd-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. nscd-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. nscd-2.28-189.8.el8_6.x86_64
RHSA-2023:7409 Moderate/Sec. nss_db-2.28-189.8.el8_6.x86_64
CVE-2023-4806 Moderate/Sec. nss_db-2.28-189.8.el8_6.x86_64
CVE-2023-4813 Moderate/Sec. nss_db-2.28-189.8.el8_6.x86_64
classification Moderate/Sec. nss_db-2.28-189.8.el8_6.x86_64
RHSA-2023:7398 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7395 Moderate/Sec. platform-python-setuptools-39.2.0-7.el8_6.noarch
CVE-2022-40897 Moderate/Sec. platform-python-setuptools-39.2.0-7.el8_6.noarch
classification Moderate/Sec. platform-python-setuptools-39.2.0-7.el8_6.noarch
RHSA-2023:7398 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45884 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45886 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2022-45919 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-2177 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3609 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
CVE-2023-3776 Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.80.1.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. python3-samba-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. python3-samba-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. python3-samba-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. python3-samba-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. python3-samba-4.15.5-13.el8_6.x86_64
RHSA-2023:7395 Moderate/Sec. python3-setuptools-39.2.0-7.el8_6.noarch
CVE-2022-40897 Moderate/Sec. python3-setuptools-39.2.0-7.el8_6.noarch
classification Moderate/Sec. python3-setuptools-39.2.0-7.el8_6.noarch
RHSA-2023:7395 Moderate/Sec. python3-setuptools-wheel-39.2.0-7.el8_6.noarch
CVE-2022-40897 Moderate/Sec. python3-setuptools-wheel-39.2.0-7.el8_6.noarch
classification Moderate/Sec. python3-setuptools-wheel-39.2.0-7.el8_6.noarch
RHSA-2023:7408 Moderate/Sec. samba-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-client-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-client-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-client-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-client-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-client-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-client-libs-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-client-libs-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-client-libs-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-client-libs-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-client-libs-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-common-4.15.5-13.el8_6.noarch
CVE-2023-3961 Moderate/Sec. samba-common-4.15.5-13.el8_6.noarch
CVE-2023-4091 Moderate/Sec. samba-common-4.15.5-13.el8_6.noarch
CVE-2023-42669 Moderate/Sec. samba-common-4.15.5-13.el8_6.noarch
classification Moderate/Sec. samba-common-4.15.5-13.el8_6.noarch
RHSA-2023:7408 Moderate/Sec. samba-common-libs-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-common-libs-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-common-libs-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-common-libs-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-common-libs-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-common-tools-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-common-tools-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-common-tools-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-common-tools-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-common-tools-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-libs-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-libs-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-libs-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-libs-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-libs-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-winbind-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-winbind-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-winbind-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-winbind-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-winbind-4.15.5-13.el8_6.x86_64
RHSA-2023:7408 Moderate/Sec. samba-winbind-modules-4.15.5-13.el8_6.x86_64
CVE-2023-3961 Moderate/Sec. samba-winbind-modules-4.15.5-13.el8_6.x86_64
CVE-2023-4091 Moderate/Sec. samba-winbind-modules-4.15.5-13.el8_6.x86_64
CVE-2023-42669 Moderate/Sec. samba-winbind-modules-4.15.5-13.el8_6.x86_64
classification Moderate/Sec. samba-winbind-modules-4.15.5-13.el8_6.x86_64
8.6.23.11.SP13
The release date of the 8.6.23.11.SP13 security patch is 1 December 2023. The estimated run time is around 80 minutes.
The 8.6.23.11.SP13 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
CVE-2023-44487
. To resolve this CVE,
contact IBM support.- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- Error 3
- Upgrade might fail with the
error:
For example:Unable to unload devtrace on node eXnY
Unable to unload devtrace on node e3n1
- Workaround
- For the workaround, see the tech note.
| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |
Workaround:
- Run the following command from all non SPU nodes to check the /boot
parameter
value:
df -h /boot
Example:df -h /boot Filesystem Size Used Avail Use% Mounted on /dev/sda1 190M 177M 0 100% /boot
- If the /boot parameter shows use of 95% or greater value, run the following
commands on all non SPU nodes to free up storage in /boot.
- Run the following command to check which kernel versions are present in each non
SPU node:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
Example:[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Run the following command to find
the default kernel version set:
[root@e2n1 ~]# uname -r 4.18.0-477.55.1.el8_8.x86_64
- If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
- Check the current kernel installed, as in step 2.a.
[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Set the default kernel based on the numbers in the previous
steps:
grub2-set-default 1
- Check that the default kernel is correctly
set:
grubby --default-kernel
- Run the following commands to reboot the
node:
sudo reboot
Alternatively, viaipmitool
:- For Dell
system
ipmitool -I lanplus -H <node>bmc -U root -P calvin power on ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
- For Lenovo
system
ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
- For Dell
system
- After the reboot, run the following command to check the current
kernel:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
-
Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
grub2-set-default 1
Skip the step 3.
- Run the following command to check which kernel versions are present in each non
SPU node:
- Run the following command from all non SPU
nodes:
package-cleanup --oldkernels --count=1
Note: When the older kernel is removed, thegrub2.cfg
list (In Step 2.a) will get shuffled. Make sure that thegrubenv
(Step 2.b) points to the available current version.If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.
RHSA-2023:6292 Moderate/Sec. curl-7.61.1-22.el8_6.9.x86_64
CVE-2023-28321 Moderate/Sec. curl-7.61.1-22.el8_6.9.x86_64
CVE-2023-38546 Moderate/Sec. curl-7.61.1-22.el8_6.9.x86_64
classification Moderate/Sec. curl-7.61.1-22.el8_6.9.x86_64
RHSA-2023:5627 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5627 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:6292 Moderate/Sec. libcurl-7.61.1-22.el8_6.9.x86_64
CVE-2023-28321 Moderate/Sec. libcurl-7.61.1-22.el8_6.9.x86_64
CVE-2023-38546 Moderate/Sec. libcurl-7.61.1-22.el8_6.9.x86_64
classification Moderate/Sec. libcurl-7.61.1-22.el8_6.9.x86_64
RHSA-2023:5769 Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
CVE-2023-44487 Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
classification Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
ref_0 Important/Sec. libnghttp2-1.33.0-4.el8_6.1.x86_64
RHSA-2023:5627 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5531 Important/Sec. platform-python-3.6.8-47.el8_6.2.x86_64
CVE-2023-40217 Important/Sec. platform-python-3.6.8-47.el8_6.2.x86_64
classification Important/Sec. platform-python-3.6.8-47.el8_6.2.x86_64
RHSA-2023:5531 Important/Sec. python3-libs-3.6.8-47.el8_6.2.x86_64
CVE-2023-40217 Important/Sec. python3-libs-3.6.8-47.el8_6.2.x86_64
classification Important/Sec. python3-libs-3.6.8-47.el8_6.2.x86_64
RHSA-2023:5627 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2020-36558 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2503 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-2873 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2022-36879 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-0590 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1095 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-1206 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-2235 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-3090 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4004 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-4128 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
CVE-2023-35001 Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.75.1.el8_6.x86_64
RHSA-2023:5610 Moderate/Sec. tar-2:1.30-5.el8_6.1.x86_64
CVE-2022-48303 Moderate/Sec. tar-2:1.30-5.el8_6.1.x86_64
classification Moderate/Sec. tar-2:1.30-5.el8_6.1.x86_64
CVE-2023-40217 - platform-python-devel-3.6.8-47.el8_6.2.x86_64.rpm
8.6.23.10.SP12
The release date of the 8.6.23.10.SP12 security patch is 19 October 2023. The estimated run time is around 80 minutes.
The 8.6.23.10.SP12 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
| 3644 | 2024-03-26 21:37:29 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node1 | CRITICAL | N/A |
| 3645 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node4 | CRITICAL | N/A |
| 3646 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node3 | CRITICAL | N/A |
| 3647 | 2024-03-26 21:37:45 | STORAGE_UTILIZATION | 901: Storage utilization above threshold | sw://fs.sda1/enclosure1.node2 | CRITICAL | N/A |
Workaround:
- Run the following command from all non SPU nodes to check the /boot
parameter
value:
df -h /boot
Example:df -h /boot Filesystem Size Used Avail Use% Mounted on /dev/sda1 190M 177M 0 100% /boot
- If the /boot parameter shows use of 95% or greater value, run the following
commands on all non SPU nodes to free up storage in /boot.
- Run the following command to check which kernel versions are present in each non
SPU node:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
Example:[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Run the following command to find
the default kernel version set:
[root@e2n1 ~]# uname -r 4.18.0-477.55.1.el8_8.x86_64
- If the kernel version is the latest, proceed to step 3. If not, perform steps 2.d to 2.h to change the default kernel and uninstall the older version.
- Check the current kernel installed, as in step 2.a.
[root@e2n1 ~]# grubby --info=ALL | grep title title="Red Hat Enterprise Linux (4.18.0-477.55.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.21.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (4.18.0-477.10.1.el8_8.x86_64) 8.8 (Ootpa)" title="Red Hat Enterprise Linux (0-rescue-71d01dc933004d72b5de179e65b44d9a) 8.8 (Ootpa)"
- Set the default kernel based on the numbers in the previous
steps:
grub2-set-default 1
- Check that the default kernel is correctly
set:
grubby --default-kernel
- Run the following commands to reboot the
node:
sudo reboot
Alternatively, viaipmitool
:- For Dell
system
ipmitool -I lanplus -H <node>bmc -U root -P calvin power on ipmitool -I lanplus -H <node>bmc -U root -P calvin power off
- For Lenovo
system
ipmitool -H <node>bmc -U USERID -P PASSW0RD -I lanplus power on ipmitool -H <node>bmcbmc -U USERID -P PASSW0RD -I lanplus power off
- For Dell
system
- After the reboot, run the following command to check the current
kernel:
[root@e2n1 ~]# grubby --default-kernel /boot/vmlinuz-4.18.0-477.55.1.el8_8.x86_64
-
Note: This saved entry value should point to the kernel that is currently running. This needs to be verified because the list of kernels will be shuffled after the removal of the old kernel. If not, after the next reboot, the operating kernel has to be changed to the default kernel. If the current kernel and the default-saved item do not match, run the following command with the correct value from the list of kernels:
grub2-set-default 1
Skip the step 3.
- Run the following command to check which kernel versions are present in each non
SPU node:
- Run the following command from all non SPU
nodes:
package-cleanup --oldkernels --count=1
Note: When the older kernel is removed, thegrub2.cfg
list (In Step 2.a) will get shuffled. Make sure that thegrubenv
(Step 2.b) points to the available current version.If this error was encountered during the security patch upgrade, then follow the procedures above and continue the upgrade.
RHSA-2023:5473 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.5.x86_64
CVE-2023-3341 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.5.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.5.x86_64
RHSA-2023:5193 Moderate/Sec. dbus-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec. dbus-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec. dbus-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5193 Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.3.noarch
CVE-2023-34969 Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.3.noarch
classification Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.3.noarch
RHSA-2023:5193 Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5193 Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5193 Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.3.x86_64
CVE-2023-34969 Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.3.x86_64
classification Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.3.x86_64
RHSA-2023:5476 Important/Sec. glibc-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-all-langpacks-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-all-langpacks-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-all-langpacks-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-common-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-common-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-common-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-devel-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-devel-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-devel-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-gconv-extra-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-gconv-extra-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-gconv-extra-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-headers-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-headers-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-headers-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-langpack-en-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-langpack-en-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-langpack-en-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-locale-source-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-locale-source-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-locale-source-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. glibc-minimal-langpack-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. glibc-minimal-langpack-2.28-189.6.el8_6.x86_64
classification Important/Sec. glibc-minimal-langpack-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. libnsl-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. libnsl-2.28-189.6.el8_6.x86_64
classification Important/Sec. libnsl-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. nscd-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. nscd-2.28-189.6.el8_6.x86_64
classification Important/Sec. nscd-2.28-189.6.el8_6.x86_64
RHSA-2023:5476 Important/Sec. nss_db-2.28-189.6.el8_6.x86_64
CVE-2023-4911 Important/Sec. nss_db-2.28-189.6.el8_6.x86_64
classification Important/Sec. nss_db-2.28-189.6.el8_6.x86_64
8.6.23.09.SP11
The release date of the 8.6.23.09.SP11 security patch is 26 September 2023. The estimated run time is around 90 minutes.
The 8.6.23.09.SP11 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
RHSA-2023:4101 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.4.x86_64
CVE-2023-2828 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.4.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.4.x86_64
RHSA-2023:4413 Important/Sec. openssh-8.0p1-15.el8_6.x86_64
CVE-2023-38408 Important/Sec. openssh-8.0p1-15.el8_6.x86_64
classification Important/Sec. openssh-8.0p1-15.el8_6.x86_64
RHSA-2023:4413 Important/Sec. openssh-clients-8.0p1-15.el8_6.x86_64
CVE-2023-38408 Important/Sec. openssh-clients-8.0p1-15.el8_6.x86_64
classification Important/Sec. openssh-clients-8.0p1-15.el8_6.x86_64
RHSA-2023:4413 Important/Sec. openssh-server-8.0p1-15.el8_6.x86_64
CVE-2023-38408 Important/Sec. openssh-server-8.0p1-15.el8_6.x86_64
classification Important/Sec. openssh-server-8.0p1-15.el8_6.x86_64
RHSA-2023:4770 Important/Sec. cups-libs-1:2.2.6-45.el8_6.3.x86_64
CVE-2023-32360 Important/Sec. cups-libs-1:2.2.6-45.el8_6.3.x86_64
classification Important/Sec. cups-libs-1:2.2.6-45.el8_6.3.x86_64
CVE-2023-32360 - cups-2.2.6-51.el8_8.1.x86_64.rpm
CVE-2023-32360 - cups-client-2.2.6-51.el8_8.1.x86_64.rpm
CVE-2023-32360 - cups-filesystem-2.2.6-51.el8_8.1.noarch.rpm
CVE-2023-32360 - cups-ipptool-2.2.6-51.el8_8.1.x86_64.rpm
RHSA-2023:4705 Important/Sec. dnf-plugin-subscription-manager-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899 Important/Sec. dnf-plugin-subscription-manager-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. dnf-plugin-subscription-manager-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4789 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4767 Moderate/Sec. libxml2-2.9.7-13.el8_6.2.x86_64
CVE-2016-3709 Moderate/Sec. libxml2-2.9.7-13.el8_6.2.x86_64
classification Moderate/Sec. libxml2-2.9.7-13.el8_6.2.x86_64
RHSA-2023:4789 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4705 Important/Sec. python3-cloud-what-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899 Important/Sec. python3-cloud-what-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. python3-cloud-what-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4767 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.2.x86_64
CVE-2016-3709 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.2.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.2.x86_64
RHSA-2023:4789 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2021-33656 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2022-42896 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1637 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-1829 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2002 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-2124 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-3390 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-20593 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-28466 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
CVE-2023-35788 Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.70.1.el8_6.x86_64
RHSA-2023:4705 Important/Sec. python3-subscription-manager-rhsm-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899 Important/Sec. python3-subscription-manager-rhsm-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. python3-subscription-manager-rhsm-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4705 Important/Sec. python3-syspurpose-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899 Important/Sec. python3-syspurpose-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. python3-syspurpose-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4705 Important/Sec. rhsm-icons-1.28.29.1-2.el8_6.noarch
CVE-2023-3899 Important/Sec. rhsm-icons-1.28.29.1-2.el8_6.noarch
classification Important/Sec. rhsm-icons-1.28.29.1-2.el8_6.noarch
RHSA-2023:4705 Important/Sec. subscription-manager-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899 Important/Sec. subscription-manager-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. subscription-manager-1.28.29.1-2.el8_6.x86_64
RHSA-2023:4705 Important/Sec. subscription-manager-cockpit-1.28.29.1-2.el8_6.noarch
CVE-2023-3899 Important/Sec. subscription-manager-cockpit-1.28.29.1-2.el8_6.noarch
classification Important/Sec. subscription-manager-cockpit-1.28.29.1-2.el8_6.noarch
RHSA-2023:4705 Important/Sec. subscription-manager-rhsm-certificates-1.28.29.1-2.el8_6.x86_64
CVE-2023-3899 Important/Sec. subscription-manager-rhsm-certificates-1.28.29.1-2.el8_6.x86_64
classification Important/Sec. subscription-manager-rhsm-certificates-1.28.29.1-2.el8_6.x86_64
8.6.23.07.SP10
The release date of 8.6.23.07.SP10 security patch is 14 August 2023. The estimated run time is around 80 minutes.
The 8.6.23.07.SP10 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- Error 3
- If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.07.SP10, the upgrade
might fail with the following error:
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
- Workaround
-
- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2023:3796 Important/Sec. platform-python-3.6.8-47.el8_6.1.x86_64
CVE-2023-24329 Important/Sec. platform-python-3.6.8-47.el8_6.1.x86_64
classification Important/Sec. platform-python-3.6.8-47.el8_6.1.x86_64
RHSA-2023:3796 Important/Sec. python3-libs-3.6.8-47.el8_6.1.x86_64
CVE-2023-24329 Important/Sec. python3-libs-3.6.8-47.el8_6.1.x86_64
classification Important/Sec. python3-libs-3.6.8-47.el8_6.1.x86_64
8.6.23.06.SP9
The release date of 8.6.23.06.SP9 security patch is 18 July 2023. The estimated run time is around 90 minutes.
The 8.6.23.06.SP9 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
- Error 1
This error occurs due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
- Workaround
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
- Error 2
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state, and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.- Workaround
-
- Wait for apupgrade to time out.
- Run oc login command that is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- Error 3
- If you try to upgrade to 2.0.2.1 after applying the security patch 8.6.23.06.SP9, the upgrade
might fail with the following error:
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
- Workaround
-
- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2023:3662 Important/Sec. c-ares-1.13.0-6.el8_6.1.x86_64
CVE-2023-32067 Important/Sec. c-ares-1.13.0-6.el8_6.1.x86_64
classification Important/Sec. c-ares-1.13.0-6.el8_6.1.x86_64
RHSA-2023:3361 Moderate/Sec. gnutls-3.6.16-5.el8_6.1.x86_64
CVE-2023-0361 Moderate/Sec. gnutls-3.6.16-5.el8_6.1.x86_64
classification Moderate/Sec. gnutls-3.6.16-5.el8_6.1.x86_64
RHSA-2023:3388 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3408 Moderate/Sec. openssl-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4304 Moderate/Sec. openssl-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4450 Moderate/Sec. openssl-1:1.1.1k-9.el8_6.x86_64
CVE-2023-0215 Moderate/Sec. openssl-1:1.1.1k-9.el8_6.x86_64
classification Moderate/Sec. openssl-1:1.1.1k-9.el8_6.x86_64
RHSA-2023:3408 Moderate/Sec. openssl-devel-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4304 Moderate/Sec. openssl-devel-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4450 Moderate/Sec. openssl-devel-1:1.1.1k-9.el8_6.x86_64
CVE-2023-0215 Moderate/Sec. openssl-devel-1:1.1.1k-9.el8_6.x86_64
classification Moderate/Sec. openssl-devel-1:1.1.1k-9.el8_6.x86_64
RHSA-2023:3408 Moderate/Sec. openssl-libs-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4304 Moderate/Sec. openssl-libs-1:1.1.1k-9.el8_6.x86_64
CVE-2022-4450 Moderate/Sec. openssl-libs-1:1.1.1k-9.el8_6.x86_64
CVE-2023-0215 Moderate/Sec. openssl-libs-1:1.1.1k-9.el8_6.x86_64
classification Moderate/Sec. openssl-libs-1:1.1.1k-9.el8_6.x86_64
RHSA-2023:3388 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.57.1.el8_6.x86_64
RHSA-2023:3388 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-3564 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-4378 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-39188 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
CVE-2022-42703 Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.57.1.el8_6.x86_64
8.6.23.05.SP8
The release date of 8.6.23.05.SP8 security patch is 31 May 2023. The estimated run time is around 80 minutes.
The 8.6.23.05.SP8 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command, which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
-
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
Workaround:- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2023:1842 Moderate/Sec. curl-7.61.1-22.el8_6.6.x86_64
CVE-2023-23916 Moderate/Sec. curl-7.61.1-22.el8_6.6.x86_64
classification Moderate/Sec. curl-7.61.1-22.el8_6.6.x86_64
RHSA-2023:1931 Important/Sec. emacs-filesystem-1:26.1-7.el8_6.1.noarch
CVE-2023-28617 Important/Sec. emacs-filesystem-1:26.1-7.el8_6.1.noarch
classification Important/Sec. emacs-filesystem-1:26.1-7.el8_6.1.noarch
RHSA-2023:1841 Important/Sec. kernel-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-core-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-core-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-devel-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-devel-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-headers-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-headers-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-modules-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-modules-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-tools-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-tools-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1842 Moderate/Sec. libcurl-7.61.1-22.el8_6.6.x86_64
CVE-2023-23916 Moderate/Sec. libcurl-7.61.1-22.el8_6.6.x86_64
classification Moderate/Sec. libcurl-7.61.1-22.el8_6.6.x86_64
RHSA-2023:2136 Important/Sec. libsmbclient-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. libsmbclient-4.15.5-12.el8_6.x86_64
classification Important/Sec. libsmbclient-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. libwbclient-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. libwbclient-4.15.5-12.el8_6.x86_64
classification Important/Sec. libwbclient-4.15.5-12.el8_6.x86_64
RHSA-2023:1841 Important/Sec. perf-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. perf-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:1841 Important/Sec. python3-perf-4.18.0-372.52.1.el8_6.x86_64
CVE-2023-0461 Important/Sec. python3-perf-4.18.0-372.52.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.52.1.el8_6.x86_64
RHSA-2023:2136 Important/Sec. python3-samba-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. python3-samba-4.15.5-12.el8_6.x86_64
classification Important/Sec. python3-samba-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-client-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-client-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-client-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-client-libs-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-client-libs-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-client-libs-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-common-4.15.5-12.el8_6.noarch
CVE-2022-38023 Important/Sec. samba-common-4.15.5-12.el8_6.noarch
classification Important/Sec. samba-common-4.15.5-12.el8_6.noarch
RHSA-2023:2136 Important/Sec. samba-common-libs-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-common-libs-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-common-libs-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-common-tools-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-common-tools-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-common-tools-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-libs-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-libs-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-libs-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-winbind-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-winbind-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-winbind-4.15.5-12.el8_6.x86_64
RHSA-2023:2136 Important/Sec. samba-winbind-modules-4.15.5-12.el8_6.x86_64
CVE-2022-38023 Important/Sec. samba-winbind-modules-4.15.5-12.el8_6.x86_64
classification Important/Sec. samba-winbind-modules-4.15.5-12.el8_6.x86_64
8.6.23.04.SP7
The release date of 8.6.23.04.SP7 security patch is 27 April 2023. The estimated run time is around 80 minutes.
The 8.6.23.04.SP7 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
-
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
Workaround:- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2023:1554 Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1441 Important/Sec. openssl-1:1.1.1k-8.el8_6.x86_64
CVE-2023-0286 Important/Sec. openssl-1:1.1.1k-8.el8_6.x86_64
classification Important/Sec. openssl-1:1.1.1k-8.el8_6.x86_64
RHSA-2023:1441 Important/Sec. openssl-devel-1:1.1.1k-8.el8_6.x86_64
CVE-2023-0286 Important/Sec. openssl-devel-1:1.1.1k-8.el8_6.x86_64
classification Important/Sec. openssl-devel-1:1.1.1k-8.el8_6.x86_64
RHSA-2023:1441 Important/Sec. openssl-libs-1:1.1.1k-8.el8_6.x86_64
CVE-2023-0286 Important/Sec. openssl-libs-1:1.1.1k-8.el8_6.x86_64
classification Important/Sec. openssl-libs-1:1.1.1k-8.el8_6.x86_64
RHSA-2023:1554 Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.51.1.el8_6.x86_64
RHSA-2023:1554 Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0266 Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
CVE-2023-0386 Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.51.1.el8_6.x86_64
8.6.23.03.SP6
The release date of 8.6.23.03.SP6 security patch is 30 March 2023. The estimated run time is around 70 minutes.
The 8.6.23.03.SP6 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
-
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
Workaround:- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2023:1130 Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.46.1.el8_6.x86_64
RHSA-2023:1130 Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-2964 Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-4269 Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
CVE-2022-41222 Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.46.1.el8_6.x86_64
8.6.23.02.SP5
The release date of 8.6.23.02.SP5 security patch is 22 February 2023. The estimated run time is around 80 minutes.
The 8.6.23.02.SP5 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
-
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
Workaround:- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2023:0440 Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-core-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-devel-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-headers-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-modules-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-tools-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0594 Important/Sec. libksba-1.3.5-9.el8_6.x86_64
CVE-2022-47629 Important/Sec. libksba-1.3.5-9.el8_6.x86_64
classification Important/Sec. libksba-1.3.5-9.el8_6.x86_64
RHSA-2023:0440 Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. perf-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0440 Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-4139 Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
CVE-2022-26373 Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
ref_0 Important/Sec. python3-perf-4.18.0-372.41.1.el8_6.x86_64
RHSA-2023:0283 Important/Sec. sudo-1.8.29-8.el8_6.1.x86_64
CVE-2023-22809 Important/Sec. sudo-1.8.29-8.el8_6.1.x86_64
classification Important/Sec. sudo-1.8.29-8.el8_6.1.x86_64
8.6.23.01.SP4
The release date of 8.6.23.01.SP4 security patch is 31 January 2023. The estimated run time is around 80 minutes.
The 8.6.23.01.SP4 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
-
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
Workaround:- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2022:8812 Moderate/Sec. dbus-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec. dbus-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec. dbus-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec. dbus-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec. dbus-1:1.12.8-18.el8_6.2.x86_64
RHSA-2022:8812 Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.2.noarch
CVE-2022-42010 Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.2.noarch
CVE-2022-42011 Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.2.noarch
CVE-2022-42012 Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.2.noarch
classification Moderate/Sec. dbus-common-1:1.12.8-18.el8_6.2.noarch
RHSA-2022:8812 Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec. dbus-daemon-1:1.12.8-18.el8_6.2.x86_64
RHSA-2022:8812 Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec. dbus-libs-1:1.12.8-18.el8_6.2.x86_64
RHSA-2022:8812 Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42010 Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42011 Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.2.x86_64
CVE-2022-42012 Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.2.x86_64
classification Moderate/Sec. dbus-tools-1:1.12.8-18.el8_6.2.x86_64
RHSA-2023:0048 Moderate/Sec. grub2-common-1:2.02-123.el8_6.12.noarch
CVE-2022-2601 Moderate/Sec. grub2-common-1:2.02-123.el8_6.12.noarch
CVE-2022-3775 Moderate/Sec. grub2-common-1:2.02-123.el8_6.12.noarch
classification Moderate/Sec. grub2-common-1:2.02-123.el8_6.12.noarch
RHSA-2023:0048 Moderate/Sec. grub2-pc-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601 Moderate/Sec. grub2-pc-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775 Moderate/Sec. grub2-pc-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec. grub2-pc-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec. grub2-pc-modules-1:2.02-123.el8_6.12.noarch
CVE-2022-2601 Moderate/Sec. grub2-pc-modules-1:2.02-123.el8_6.12.noarch
CVE-2022-3775 Moderate/Sec. grub2-pc-modules-1:2.02-123.el8_6.12.noarch
classification Moderate/Sec. grub2-pc-modules-1:2.02-123.el8_6.12.noarch
RHSA-2023:0048 Moderate/Sec. grub2-tools-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601 Moderate/Sec. grub2-tools-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775 Moderate/Sec. grub2-tools-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec. grub2-tools-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec. grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601 Moderate/Sec. grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775 Moderate/Sec. grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec. grub2-tools-efi-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec. grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601 Moderate/Sec. grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775 Moderate/Sec. grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec. grub2-tools-extra-1:2.02-123.el8_6.12.x86_64
RHSA-2023:0048 Moderate/Sec. grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
CVE-2022-2601 Moderate/Sec. grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
CVE-2022-3775 Moderate/Sec. grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
classification Moderate/Sec. grub2-tools-minimal-1:2.02-123.el8_6.12.x86_64
RHSA-2022:8809 Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.36.1.el8_6.x86_64
RHSA-2022:8809 Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-1158 Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
CVE-2022-2639 Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.36.1.el8_6.x86_64
8.6.22.12.SP3
The release date of 8.6.22.12.SP3 security patch is 6 January 2023.The estimated run time is around 80 minutes. This security patch includes the list of CVEs for November and December 2022.
The 8.6.22.12.SP3 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
-
1. McpUpgrader.install Upgrade Detail: Component install for mcp Caller Info:The call was made from 'McpInstaller.install' on line 54 with file located at '/localrepo/2.0.2.1/EXTRACT/platform/upgrade/bundle_upgraders/../mcp/mcp_installer.py' Message: mcp:AbstractUpgrader.installer:Failed to execute mcp update
Workaround:- Run the following command to extract
RPMs:
cd /localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos && rpm2cpio master*.rpm | cpio -idm && rpm2cpio master*.rpm | cpio -t
- Copy
node-os*.rpm
from the 2.0.2.1 bundle to /tmp on all control nodes.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'scp e1n1:/localrepo/<2.0.2.1_bundle_dir>/EXTRACT/platform/upgrade/nodeos/install/master-node-xcat-bundle/node-os-2.0.2.0.noarch.rpm /tmp/'; done
- Install the copied
node-os*.rpm
.for i in $(/opt/ibm/appliance/platform/xcat/scripts/xcat/display_nodes.py --control); do ssh $i 'rpm -Uvh --force /tmp/node-os-2.0.2.0.noarch.rpm'; done
- Rerun the same apupgrade command that
failed:
apupgrade --upgrade --upgrade-directory /localrepo --phase platform --use-version <your-2.0.2.1-upgrade-dir>
- Run the following command to extract
RPMs:
RHSA-2022:7192 Important/Sec. device-mapper-multipath-0.8.4-22.el8_6.2.x86_64
CVE-2022-41974 Important/Sec. device-mapper-multipath-0.8.4-22.el8_6.2.x86_64
classification Important/Sec. device-mapper-multipath-0.8.4-22.el8_6.2.x86_64
RHSA-2022:7192 Important/Sec. device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64
CVE-2022-41974 Important/Sec. device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64
classification Important/Sec. device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64
RHSA-2022:7105 Moderate/Sec. gnutls-3.6.16-5.el8_6.x86_64
CVE-2022-2509 Moderate/Sec. gnutls-3.6.16-5.el8_6.x86_64
classification Moderate/Sec. gnutls-3.6.16-5.el8_6.x86_64
RHSA-2022:7105 Moderate/Sec. gnutls-c++-3.6.16-5.el8_6.x86_64
CVE-2022-2509 Moderate/Sec. gnutls-c++-3.6.16-5.el8_6.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-5.el8_6.x86_64
RHSA-2022:7105 Moderate/Sec. gnutls-dane-3.6.16-5.el8_6.x86_64
CVE-2022-2509 Moderate/Sec. gnutls-dane-3.6.16-5.el8_6.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-5.el8_6.x86_64
RHSA-2022:7105 Moderate/Sec. gnutls-utils-3.6.16-5.el8_6.x86_64
CVE-2022-2509 Moderate/Sec. gnutls-utils-3.6.16-5.el8_6.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-5.el8_6.x86_64
RHSA-2022:7006 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21619 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21624 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21626 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21628 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.352.b08-2.el8_6.x86_64
RHSA-2022:7006 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21619 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21624 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21626 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
CVE-2022-21628 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.352.b08-2.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7192 Important/Sec. kpartx-0.8.4-22.el8_6.2.x86_64
CVE-2022-41974 Important/Sec. kpartx-0.8.4-22.el8_6.2.x86_64
classification Important/Sec. kpartx-0.8.4-22.el8_6.2.x86_64
RHSA-2022:7089 Important/Sec. libksba-1.3.5-8.el8_6.x86_64
CVE-2022-3515 Important/Sec. libksba-1.3.5-8.el8_6.x86_64
classification Important/Sec. libksba-1.3.5-8.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. libsmbclient-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. libsmbclient-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. libsmbclient-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. libwbclient-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. libwbclient-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. libwbclient-4.15.5-10.el8_6.x86_64
RHSA-2022:7110 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7110 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-0494 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-1353 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-2588 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23816 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-23825 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29900 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
CVE-2022-29901 Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.32.1.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. python3-samba-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. python3-samba-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. python3-samba-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-client-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-client-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-client-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-client-libs-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-client-libs-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-client-libs-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-common-4.15.5-10.el8_6.noarch
CVE-2022-32742 Moderate/Sec. samba-common-4.15.5-10.el8_6.noarch
classification Moderate/Sec. samba-common-4.15.5-10.el8_6.noarch
RHSA-2022:7111 Moderate/Sec. samba-common-libs-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-common-libs-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-common-libs-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-common-tools-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-common-tools-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-common-tools-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-libs-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-libs-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-libs-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-winbind-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-winbind-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-winbind-4.15.5-10.el8_6.x86_64
RHSA-2022:7111 Moderate/Sec. samba-winbind-modules-4.15.5-10.el8_6.x86_64
CVE-2022-32742 Moderate/Sec. samba-winbind-modules-4.15.5-10.el8_6.x86_64
classification Moderate/Sec. samba-winbind-modules-4.15.5-10.el8_6.x86_64
RHSA-2022:7108 Moderate/Sec. sqlite-3.26.0-16.el8_6.x86_64
CVE-2020-35525 Moderate/Sec. sqlite-3.26.0-16.el8_6.x86_64
CVE-2020-35527 Moderate/Sec. sqlite-3.26.0-16.el8_6.x86_64
classification Moderate/Sec. sqlite-3.26.0-16.el8_6.x86_64
RHSA-2022:7108 Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.x86_64
CVE-2020-35525 Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.x86_64
CVE-2020-35527 Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.x86_64
classification Moderate/Sec. sqlite-libs-3.26.0-16.el8_6.x86_64
RHSA-2022:7106 Moderate/Sec. zlib-1.2.11-19.el8_6.x86_64
CVE-2022-37434 Moderate/Sec. zlib-1.2.11-19.el8_6.x86_64
classification Moderate/Sec. zlib-1.2.11-19.el8_6.x86_64
RHSA-2022:7106 Moderate/Sec. zlib-devel-1.2.11-19.el8_6.x86_64
CVE-2022-37434 Moderate/Sec. zlib-devel-1.2.11-19.el8_6.x86_64
classification Moderate/Sec. zlib-devel-1.2.11-19.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-devel-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-devel-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-devel-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-libs-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-libs-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-libs-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-pkinit-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-pkinit-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-pkinit-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-server-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-server-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-server-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. krb5-workstation-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. krb5-workstation-1.18.2-15.el8_6.x86_64
classification Important/Sec. krb5-workstation-1.18.2-15.el8_6.x86_64
RHSA-2022:8662 Important/Sec. libkadm5-1.18.2-15.el8_6.x86_64
CVE-2022-42898 Important/Sec. libkadm5-1.18.2-15.el8_6.x86_64
classification Important/Sec. libkadm5-1.18.2-15.el8_6.x86_64
CVE-2021-29740 gpfs.adv-5.1.2-7.x86_64
8.6.22.10.SP2
The release date of 8.6.22.10.SP2 security patch is 26 October 2022. The estimated run time is around 120 minutes.
The 8.6.22.10.SP2 patch is based on RHEL 8.6, and it can only be installed on Cloud Pak for Data System 2.0.2 versions.
due to a mismatch in the RHEL versions.apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release <class 'Exception'>
Workaround:- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
This error happens afterFATAL ERROR: McpUpgrader.preinstall : Openshift login timed out after waiting for 30 minutes. Please run following command manually and if successful resume upgrade, or contact IBM Support for help
apupgrade
starts the system, brings it toReady
state and then runs theoc login
command. Whenapupgrade
terminates with a timeout,oc login
seems to be working manually and after you restart theapupgrade
, the sameoc login
command works.Workaround:- Wait for apupgrade to time out.
- Run oc login command which is written in the log. For
example:
oc login -u system:admin -n default https://api.localcluster.fbond:6443
- Restart the upgrade.
- From
RHSA-2022:6778 Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-libs-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38177 Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38178 Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
classification Important/Sec. bind-license-32:9.11.36-3.el8_6.1.noarch
RHSA-2022:6778 Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6778 Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38177 Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
CVE-2022-38178 Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
classification Important/Sec. bind-utils-32:9.11.36-3.el8_6.1.x86_64
RHSA-2022:6878 Important/Sec. expat-2.2.5-8.el8_6.3.x86_64
CVE-2022-40674 Important/Sec. expat-2.2.5-8.el8_6.3.x86_64
classification Important/Sec. expat-2.2.5-8.el8_6.3.x86_64
RHSA-2022:6463 Moderate/Sec. gnupg2-2.2.20-3.el8_6.x86_64
CVE-2022-34903 Moderate/Sec. gnupg2-2.2.20-3.el8_6.x86_64
classification Moderate/Sec. gnupg2-2.2.20-3.el8_6.x86_64
RHSA-2022:6463 Moderate/Sec. gnupg2-smime-2.2.20-3.el8_6.x86_64
CVE-2022-34903 Moderate/Sec. gnupg2-smime-2.2.20-3.el8_6.x86_64
classification Moderate/Sec. gnupg2-smime-2.2.20-3.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-core-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-core-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-core-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-core-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-core-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-devel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-devel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-devel-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-devel-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-headers-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-headers-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-headers-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-headers-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-modules-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-modules-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-modules-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-modules-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-tools-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-tools-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-tools-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-tools-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6443 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46659 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46661 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46663 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46664 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46665 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46668 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46669 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-21427 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24048 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24050 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24051 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24052 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27376 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27377 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27378 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27379 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27380 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27381 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27383 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27384 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27386 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27387 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27445 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27447 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27448 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27449 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27452 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27456 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27458 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31622 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31623 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32083 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32085 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32087 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32088 Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
classification Moderate/Sec. mariadb-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
RHSA-2022:6443 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46659 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46661 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46663 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46664 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46665 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46668 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2021-46669 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-21427 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24048 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24050 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24051 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-24052 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27376 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27377 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27378 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27379 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27380 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27381 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27383 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27384 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27386 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27387 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27445 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27447 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27448 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27449 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27452 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27456 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-27458 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31622 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-31623 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32083 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32085 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32087 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
CVE-2022-32088 Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
classification Moderate/Sec. mariadb-common-3:10.3.35-1.module+el8.6.0+15949+4ba4ec26.x86_64
RHSA-2022:6460 Moderate/Sec. perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. perf-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. perf-4.18.0-372.26.1.el8_6.x86_64
RHSA-2022:6457 Moderate/Sec. platform-python-3.6.8-47.el8_6.x86_64
CVE-2015-20107 Moderate/Sec. platform-python-3.6.8-47.el8_6.x86_64
CVE-2022-0391 Moderate/Sec. platform-python-3.6.8-47.el8_6.x86_64
classification Moderate/Sec. platform-python-3.6.8-47.el8_6.x86_64
RHSA-2022:6457 Moderate/Sec. platform-python-devel-3.6.8-47.el8_6.x86_64
CVE-2015-20107 Moderate/Sec. platform-python-devel-3.6.8-47.el8_6.x86_64
CVE-2022-0391 Moderate/Sec. platform-python-devel-3.6.8-47.el8_6.x86_64
classification Moderate/Sec. platform-python-devel-3.6.8-47.el8_6.x86_64
RHSA-2022:6778 Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38177 Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
CVE-2022-38178 Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
classification Important/Sec. python3-bind-32:9.11.36-3.el8_6.1.noarch
RHSA-2022:6457 Moderate/Sec. python3-libs-3.6.8-47.el8_6.x86_64
CVE-2015-20107 Moderate/Sec. python3-libs-3.6.8-47.el8_6.x86_64
CVE-2022-0391 Moderate/Sec. python3-libs-3.6.8-47.el8_6.x86_64
classification Moderate/Sec. python3-libs-3.6.8-47.el8_6.x86_64
RHSA-2022:6460 Moderate/Sec. python3-perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21123 Moderate/Sec. python3-perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21125 Moderate/Sec. python3-perf-4.18.0-372.26.1.el8_6.x86_64
CVE-2022-21166 Moderate/Sec. python3-perf-4.18.0-372.26.1.el8_6.x86_64
classification Moderate/Sec. python3-perf-4.18.0-372.26.1.el8_6.x86_64
8.6.22.09.SP1
Security patch released in September 2022. The estimated run time is around 120 minutes.
apupgrade --use-version 8.2.22.08.SP1-20220810.193807-1-icpds-release --upgrade-directory /localrepo --upgrade --phase platform
Logging to: /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log
Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20220816/apupgrade20220816032148.log.tracelog
Unable to upgrade to a security patch with mismatched RHEL versions. 2.0.2.0-20220805081320b26605 does not support upgrade to 8.2.22.08.SP1-20220810.193807-1-icpds-release
<class 'Exception'>
due to a mismatch in the RHEL versions. Workaround:
- From
e1n1
, run the following commands to patch the code in the existing scripts:-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py
-
sed -i -e "s,':' -f5,' ' -f6,g" /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
sed -i -e 's,system-release-cpe,redhat-release,g' /opt/ibm/appliance/apupgrade/modules/ibm/ca/checker/yosemite_bundleupgradechecker.py
-
RHSA-2022:5326 Low/Sec. compat-openssl10-1:1.0.2o-4.el8_6.x86_64
CVE-2022-0778 Low/Sec. compat-openssl10-1:1.0.2o-4.el8_6.x86_64
classification Low/Sec. compat-openssl10-1:1.0.2o-4.el8_6.x86_64
RHSA-2022:5313 Moderate/Sec. curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-22576 Moderate/Sec. curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27774 Moderate/Sec. curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27776 Moderate/Sec. curl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27782 Moderate/Sec. curl-7.61.1-22.el8_6.3.x86_64
classification Moderate/Sec. curl-7.61.1-22.el8_6.3.x86_64
RHSA-2022:6159 Moderate/Sec. curl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32206 Moderate/Sec. curl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32208 Moderate/Sec. curl-7.61.1-22.el8_6.4.x86_64
classification Moderate/Sec. curl-7.61.1-22.el8_6.4.x86_64
RHSA-2022:5314 Moderate/Sec. expat-2.2.5-8.el8_6.2.x86_64
CVE-2022-25313 Moderate/Sec. expat-2.2.5-8.el8_6.2.x86_64
CVE-2022-25314 Moderate/Sec. expat-2.2.5-8.el8_6.2.x86_64
classification Moderate/Sec. expat-2.2.5-8.el8_6.2.x86_64
RHSA-2022:5095 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2021-3695 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2021-3696 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2021-3697 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28733 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28734 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28735 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28736 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
CVE-2022-28737 Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
classification Important/Sec. grub2-common-1:2.02-123.el8_6.8.noarch
RHSA-2022:5095 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-pc-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2021-3695 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2021-3696 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2021-3697 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28733 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28734 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28735 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28736 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
CVE-2022-28737 Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
classification Important/Sec. grub2-pc-modules-1:2.02-123.el8_6.8.noarch
RHSA-2022:5095 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-efi-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-extra-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5095 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2021-3695 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2021-3696 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2021-3697 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28733 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28734 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28735 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28736 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
CVE-2022-28737 Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
classification Important/Sec. grub2-tools-minimal-1:2.02-123.el8_6.8.x86_64
RHSA-2022:5163 Low/Sec. httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec. httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec. httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2022:5163 Low/Sec. httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2.noarch
CVE-2020-13950 Low/Sec. httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2.noarch
classification Low/Sec. httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2.noarch
RHSA-2022:5163 Low/Sec. httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec. httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec. httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2020:0981 Important/Sec. ipmitool-1.8.18-12.el8_1.x86_64
CVE-2020-5208 Important/Sec. ipmitool-1.8.18-12.el8_1.x86_64
classification Important/Sec. ipmitool-1.8.18-12.el8_1.x86_64
RHSA-2022:5696 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21540 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21541 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-34169 Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64
RHSA-2022:5696 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21540 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-21541 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
CVE-2022-34169 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-core-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-devel-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-headers-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-modules-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-tools-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5819 Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5313 Moderate/Sec. libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-22576 Moderate/Sec. libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27774 Moderate/Sec. libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27776 Moderate/Sec. libcurl-7.61.1-22.el8_6.3.x86_64
CVE-2022-27782 Moderate/Sec. libcurl-7.61.1-22.el8_6.3.x86_64
classification Moderate/Sec. libcurl-7.61.1-22.el8_6.3.x86_64
RHSA-2022:6159 Moderate/Sec. libcurl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32206 Moderate/Sec. libcurl-7.61.1-22.el8_6.4.x86_64
CVE-2022-32208 Moderate/Sec. libcurl-7.61.1-22.el8_6.4.x86_64
classification Moderate/Sec. libcurl-7.61.1-22.el8_6.4.x86_64
RHSA-2022:5311 Moderate/Sec. libgcrypt-1.8.5-7.el8_6.x86_64
CVE-2021-40528 Moderate/Sec. libgcrypt-1.8.5-7.el8_6.x86_64
classification Moderate/Sec. libgcrypt-1.8.5-7.el8_6.x86_64
RHSA-2022:5331 Moderate/Sec. libinput-1.16.3-3.el8_6.x86_64
CVE-2022-1215 Moderate/Sec. libinput-1.16.3-3.el8_6.x86_64
classification Moderate/Sec. libinput-1.16.3-3.el8_6.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-client-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-config-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-network-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-daemon-kvm-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5821 Moderate/Sec. libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4206 Moderate/Sec. libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2021-4207 Moderate/Sec. libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26353 Moderate/Sec. libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
CVE-2022-26354 Moderate/Sec. libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
classification Moderate/Sec. libvirt-libs-8.0.0-5.2.module+el8.6.0+15256+3a0914fe.x86_64
RHSA-2022:5317 Moderate/Sec. libxml2-2.9.7-13.el8_6.1.x86_64
CVE-2022-29824 Moderate/Sec. libxml2-2.9.7-13.el8_6.1.x86_64
classification Moderate/Sec. libxml2-2.9.7-13.el8_6.1.x86_64
RHSA-2022:5163 Low/Sec. mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec. mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec. mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2022:5163 Low/Sec. mod_ssl-1:2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
CVE-2020-13950 Low/Sec. mod_ssl-1:2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
classification Low/Sec. mod_ssl-1:2.4.37-47.module+el8.6.0+15654+427eba2e.2.x86_64
RHSA-2022:5095 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2021-3695 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2021-3696 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2021-3697 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28733 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28734 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28735 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28736 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
CVE-2022-28737 Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
classification Important/Sec. mokutil-1:0.3.0-11.el8_6.1.x86_64
RHSA-2022:5818 Moderate/Sec. openssl-1:1.1.1k-7.el8_6.x86_64
CVE-2022-1292 Moderate/Sec. openssl-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2068 Moderate/Sec. openssl-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2097 Moderate/Sec. openssl-1:1.1.1k-7.el8_6.x86_64
classification Moderate/Sec. openssl-1:1.1.1k-7.el8_6.x86_64
RHSA-2022:5818 Moderate/Sec. openssl-devel-1:1.1.1k-7.el8_6.x86_64
CVE-2022-1292 Moderate/Sec. openssl-devel-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2068 Moderate/Sec. openssl-devel-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2097 Moderate/Sec. openssl-devel-1:1.1.1k-7.el8_6.x86_64
classification Moderate/Sec. openssl-devel-1:1.1.1k-7.el8_6.x86_64
RHSA-2022:5818 Moderate/Sec. openssl-libs-1:1.1.1k-7.el8_6.x86_64
CVE-2022-1292 Moderate/Sec. openssl-libs-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2068 Moderate/Sec. openssl-libs-1:1.1.1k-7.el8_6.x86_64
CVE-2022-2097 Moderate/Sec. openssl-libs-1:1.1.1k-7.el8_6.x86_64
classification Moderate/Sec. openssl-libs-1:1.1.1k-7.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec. pcre2-10.32-3.el8_6.x86_64
CVE-2022-1586 Moderate/Sec. pcre2-10.32-3.el8_6.x86_64
classification Moderate/Sec. pcre2-10.32-3.el8_6.x86_64
ref_0 Moderate/Sec. pcre2-10.32-3.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec. pcre2-devel-10.32-3.el8_6.x86_64
CVE-2022-1586 Moderate/Sec. pcre2-devel-10.32-3.el8_6.x86_64
classification Moderate/Sec. pcre2-devel-10.32-3.el8_6.x86_64
ref_0 Moderate/Sec. pcre2-devel-10.32-3.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec. pcre2-utf16-10.32-3.el8_6.x86_64
CVE-2022-1586 Moderate/Sec. pcre2-utf16-10.32-3.el8_6.x86_64
classification Moderate/Sec. pcre2-utf16-10.32-3.el8_6.x86_64
ref_0 Moderate/Sec. pcre2-utf16-10.32-3.el8_6.x86_64
RHSA-2022:5809 Moderate/Sec. pcre2-utf32-10.32-3.el8_6.x86_64
CVE-2022-1586 Moderate/Sec. pcre2-utf32-10.32-3.el8_6.x86_64
classification Moderate/Sec. pcre2-utf32-10.32-3.el8_6.x86_64
ref_0 Moderate/Sec. pcre2-utf32-10.32-3.el8_6.x86_64
RHSA-2022:5819 Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. perf-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5317 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.1.x86_64
CVE-2022-29824 Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.1.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-13.el8_6.1.x86_64
RHSA-2022:5819 Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-1012 Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
CVE-2022-32250 Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
classification Important/Sec. python3-perf-4.18.0-372.19.1.el8_6.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-img-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-common-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-core-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-docs-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:5821 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4206 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2021-4207 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26353 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
CVE-2022-26354 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
classification Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-11.module+el8.6.0+15668+464a1f31.2.x86_64
RHSA-2022:6180 Important/Sec. rsync-3.1.3-14.el8_6.3.x86_64
CVE-2022-29154 Important/Sec. rsync-3.1.3-14.el8_6.3.x86_64
classification Important/Sec. rsync-3.1.3-14.el8_6.3.x86_64
RHSA-2022:6180 Important/Sec. rsync-daemon-3.1.3-14.el8_6.3.noarch
CVE-2022-29154 Important/Sec. rsync-daemon-3.1.3-14.el8_6.3.noarch
classification Important/Sec. rsync-daemon-3.1.3-14.el8_6.3.noarch
RHSA-2022:5779 Moderate/Sec. ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
CVE-2021-41817 Moderate/Sec. ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
CVE-2021-41819 Moderate/Sec. ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
classification Moderate/Sec. ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1.x86_64
RHSA-2022:6206 Important/Sec. systemd-239-58.el8_6.4.x86_64
CVE-2022-2526 Important/Sec. systemd-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-container-239-58.el8_6.4.x86_64
CVE-2022-2526 Important/Sec. systemd-container-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-container-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-libs-239-58.el8_6.4.x86_64
CVE-2022-2526 Important/Sec. systemd-libs-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-libs-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-pam-239-58.el8_6.4.x86_64
CVE-2022-2526 Important/Sec. systemd-pam-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-pam-239-58.el8_6.4.x86_64
RHSA-2022:6206 Important/Sec. systemd-udev-239-58.el8_6.4.x86_64
CVE-2022-2526 Important/Sec. systemd-udev-239-58.el8_6.4.x86_64
classification Important/Sec. systemd-udev-239-58.el8_6.4.x86_64
RHSA-2022:5319 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1621 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1629 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.2.x86_64
classification Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.2.x86_64
RHSA-2022:5813 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1785 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1897 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1927 Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.4.x86_64
classification Moderate/Sec. vim-common-2:8.0.1763-19.el8_6.4.x86_64
RHSA-2022:5319 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1621 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1629 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
classification Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.2.x86_64
RHSA-2022:5813 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1785 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1897 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1927 Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
classification Moderate/Sec. vim-enhanced-2:8.0.1763-19.el8_6.4.x86_64
RHSA-2022:5319 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
CVE-2022-1621 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
CVE-2022-1629 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
classification Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.2.noarch
RHSA-2022:5813 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
CVE-2022-1785 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
CVE-2022-1897 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
CVE-2022-1927 Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
classification Moderate/Sec. vim-filesystem-2:8.0.1763-19.el8_6.4.noarch
RHSA-2022:5319 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1621 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
CVE-2022-1629 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
classification Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.2.x86_64
RHSA-2022:5813 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1785 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1897 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
CVE-2022-1927 Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.4.x86_64
classification Moderate/Sec. vim-minimal-2:8.0.1763-19.el8_6.4.x86_64